e01}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 20:42:19 executing program 1: setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0), 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000180)) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000040)={r2}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000080)={r2}) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x4) 20:42:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r4, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r5, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r5, 0x4008af13, &(0x7f00000003c0)={0x1, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x3, 0x5, 0x9}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:19 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x101480, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) 20:42:19 executing program 4: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:19 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {}], [{@dont_measure}]}}) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2000, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {}], [{@dont_measure}]}}) (async) 20:42:19 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 20:42:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r4, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r5, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r5, 0x4008af13, &(0x7f00000003c0)={0x1, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x3, 0x5, 0x9}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:19 executing program 1: setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0), 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async, rerun: 32) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async, rerun: 32) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async, rerun: 32) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000180)) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (rerun: 32) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000040)={r2}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000080)={r2}) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, &(0x7f0000000140)=0x4) 20:42:19 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x101480, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async, rerun: 32) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) (async, rerun: 32) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) (rerun: 32) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) 20:42:19 executing program 4: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:19 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ba00"]) r0 = request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xa9) 20:42:19 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {}], [{@dont_measure}]}}) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2000, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {}], [{@dont_measure}]}}) (async) 20:42:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r4, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r5, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r5, 0x4008af13, &(0x7f00000003c0)={0x1, 0x8}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x3, 0x5, 0x9}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1000000, 0x200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r4, 0x8004af7a, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r3}) 20:42:19 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:19 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ba00"]) (async, rerun: 32) r0 = request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) (rerun: 32) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xa9) 20:42:19 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "d73c369267bee96a045bf9900e3a8cbba7a5dc3dcd11d275a6e15b176aeb763fab515124e190825dd51c757e52511ef4f3cd702609b66a695471a84bf49959a0", 0x1d}, 0x48, 0xfffffffffffffffb) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='.\x00', 0x0, 0x2000, 0x0) 20:42:19 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r3, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r4, 0x4008af13, &(0x7f00000003c0)={0x1, 0x8}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:19 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1000000, 0x200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r4, 0x8004af7a, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r3}) syz_open_dev$dri(&(0x7f0000000000), 0x1000000, 0x200) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) ioctl$VHOST_VDPA_GET_AS_NUM(r4, 0x8004af7a, &(0x7f00000000c0)) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r3}) (async) 20:42:19 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:19 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "d73c369267bee96a045bf9900e3a8cbba7a5dc3dcd11d275a6e15b176aeb763fab515124e190825dd51c757e52511ef4f3cd702609b66a695471a84bf49959a0", 0x1d}, 0x48, 0xfffffffffffffffb) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async, rerun: 32) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) (async, rerun: 32) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='.\x00', 0x0, 0x2000, 0x0) 20:42:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1000000, 0x200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r4, 0x8004af7a, &(0x7f00000000c0)) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r3}) (rerun: 32) 20:42:20 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r3, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ba00"]) r0 = request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xa9) 20:42:20 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "d73c369267bee96a045bf9900e3a8cbba7a5dc3dcd11d275a6e15b176aeb763fab515124e190825dd51c757e52511ef4f3cd702609b66a695471a84bf49959a0", 0x1d}, 0x48, 0xfffffffffffffffb) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='.\x00', 0x0, 0x2000, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "d73c369267bee96a045bf9900e3a8cbba7a5dc3dcd11d275a6e15b176aeb763fab515124e190825dd51c757e52511ef4f3cd702609b66a695471a84bf49959a0", 0x1d}, 0x48, 0xfffffffffffffffb) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='.\x00', 0x0, 0x2000, 0x0) (async) 20:42:20 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000040)={r0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000080)={r0}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r3, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66873fbea31294643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) 20:42:20 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000040)={r0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000080)={r0}) 20:42:20 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66873fbea31294643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) 20:42:20 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:20 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$SNDCTL_MIDI_INFO(r3, 0xc074510c, &(0x7f0000000340)={"1b032bc48acfa5bb285b8435ec5024fe34f4289044de7c4c4a691fd7e852", 0xffff11da, 0x401, 0x5, [0x9, 0xbb8, 0x5, 0x0, 0x4, 0x6, 0x3f, 0x7, 0x1, 0x14, 0x1aeb, 0x7, 0x401, 0x7, 0x4, 0x7fffffff, 0x9, 0x7f]}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000040)={r0}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000080)={r0}) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66873fbea31294643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:20 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt={'euid>', r0}}]}}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="77d5a07703b50761df250a0000000c000600020000000200000008000300", @ANYRES32=r2, @ANYBLOB="0c00060000000000000000000c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4008040}, 0x40004) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000040)={r4}) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r6) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16=r7, @ANYRES32=r1, @ANYBLOB="7c4fb9e3e2cea963e466cc0f632350af0cbf65b6fb826655abef070f36b533ce6928b8304b6df251a835a371a6124c20090bb8b31228b8df23b80fa4d865af71bf60767dedaa4739925eaa0aa84a754d942cd79b9c4a012dd3a833367bfc0a82b542327884cb28a37d8da90b5ca47f86c8a7325797bbd53635498263eebda4d9f5ea5043d514b37a635ee5047746203ef4a8e0c63b12b6dcd63d7d669bc63ff98601980375ec2080ed75febb20262397b4cb976db53a86c38c2b69fd85d182f7110dfabed520378ae05d8b3ca6b2f2c4112c9f7996c24d9f1552ac5daf476ee57c8e6b7132b23f2192d405ffd2e246535e9b", @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="00022abd7000fbdbdf25090000000c00060003000000030000000500080018000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4c010) ioctl$TCSETS2(r5, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0xffffffff, 0x81, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000140)={r9}) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, @none={0x0, 0x1}}, 0x14, &(0x7f0000000400)={&(0x7f0000001740)="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", 0x1000}, 0x1, 0x0, 0x0, 0x15}, 0x20000004) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000080)={r4}) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ff65"]) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x9b, &(0x7f00000000c0)=0x1) 20:42:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="77d5a07703b50761df250a0000000c000600020000000200000008000300", @ANYRES32=r2, @ANYBLOB="0c00060000000000000000000c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4008040}, 0x40004) (async) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000040)={r4}) (async, rerun: 64) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) (async, rerun: 64) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r6) (async) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) (async) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16=r7, @ANYRES32=r1, @ANYBLOB="7c4fb9e3e2cea963e466cc0f632350af0cbf65b6fb826655abef070f36b533ce6928b8304b6df251a835a371a6124c20090bb8b31228b8df23b80fa4d865af71bf60767dedaa4739925eaa0aa84a754d942cd79b9c4a012dd3a833367bfc0a82b542327884cb28a37d8da90b5ca47f86c8a7325797bbd53635498263eebda4d9f5ea5043d514b37a635ee5047746203ef4a8e0c63b12b6dcd63d7d669bc63ff98601980375ec2080ed75febb20262397b4cb976db53a86c38c2b69fd85d182f7110dfabed520378ae05d8b3ca6b2f2c4112c9f7996c24d9f1552ac5daf476ee57c8e6b7132b23f2192d405ffd2e246535e9b", @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) sendmsg$NL802154_CMD_SET_CHANNEL(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="00022abd7000fbdbdf25090000000c00060003000000030000000500080018000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4c010) ioctl$TCSETS2(r5, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0xffffffff, 0x81, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000140)={r9}) (async, rerun: 32) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, @none={0x0, 0x1}}, 0x14, &(0x7f0000000400)={&(0x7f0000001740)="b53aedb3349e7ac9fe524265bdd33c822e72a3502d133e3e7542e1d9494a0fd5de443254d74c64aa113a979e1db1f51f5537a540eaa75577ffa991444d3a8ccb3c60e00379fcd580ee0ddceb372f9f56ed9f8351325ec942d5c4f63d62f66e58ec1c6a23685a312317530d126e9eff61b0ea094735b17bb3f64d9355a1915bf3cb7e23c994df455ddbbf3b56eebecc03f1409364ca9534bb421aa7f3c2f59659c64bb13717e3639eaafcc0a310db843cfd3efe809ee45bb069a83a44effc501f79e456753ba9899efbf4a4943727704c6e7d5edbe807fea7ad26d0c9f80c4c34573706b7c54a8b1687db774b8e97c7abd62e64807d0b877aa24f4908e7e91bacd0f67a4035b8b416f2bff3d4c44eab21978425302bd4a18a5773595e8b4cce005d264d795ea157134e2c0aa3d279dcb205256baa9ab52643003a3e23706ed0723754681879d50e82688aa0ccc00fa3af82cc9b05b667d0dc2262b3db81027f7da041ea245b8e86f447bc9b9100b55fc1b7dcc68b102b19acf5bb2074b114052fac3713236292f6d32b72c42c8d32facd2cb4f2216aa1ab6ab38e7f43f2fb67a28adda0c629b843f8af8f5fa3a8df8143632141655247a3d16453fc6b42a056ae1ea92d934c882689af23443d4312d8a4907dab457b904ebbf8727cb4dec7561d5e3589d9f55d653b20346a3c26d8a624501155059709a247c482d5d1d3097740eb7959c57da9c381b39feb3fb8c7b689a37efcaa9286bf3c24794c530a0123d3cdeffbe1516a256ca14fc5a076b93907cbd86e7ef96c51e465c9cab17d57bcb30c82a20ccc89cd6140acc0f1aa621cde8b79c4572bce3a19a4f8cce10f563e59ea7080cfa43131cf2e65c770aebd85aef04392173899ccfc362995e4dc0f8b3d06ea309ed775d62be68c593e26a7335a665178fecbb709f57dbdb712671afd362e0cb86c1e3f2299788f79b772915255420e2fd225f3fa18bda6cdc19a17386e5fce45aabf836aba2471656a0a4101069827f06244c73b1dd64278e5cf9e05a423b4464025c1ee297b33c86a73aaca475ef19a546f2a19a755c8272d31bd316d6f02496de9fba84c448426e6ac5745747eeaf9f8aad95a2d2aede3db3b09e72f6df9f437531b25bb30c80e847a7a4e92502bcae3e95012d3927218bdacc2ee903fd28f33c98482d9c0dc155948440293e171021f17540470b189b4a7dac60eedd406bafa10e0e42dd997cc912fbb77d5dd0fa1aba345bb894287c352bc7dbee3d43ebdf1b990ac1a2841cd685eb9c290627194ca53feb8d66625b0caacf61a6bafce6af2d3d93a72801d8977220ac97f03c9116ed3ef1b44fc2b6bfbb9f10ff2962d328a60abe742d55838cd77fad9f04a265955d5d92f607545e6177f0f71ad3eac4b53f43a9a678f9b6f0617c96b315816d6b0e1d12ca2b7fb76ba66da4d5525feb7c40cb222c837b46bd00db300958fb0679bb48ccc0c9f40f068860306631eac7d4680d06209506e2b26ed14ae78ac193f70c8a1d71d2ead7cec4bd197adc7da04bf414e8b3207fdae3f9553e63fa195d7273d6bcc475c96ade862c085ee0c3b367fc9dad6b70f9cc96d6f904fb16bd1b04c81d01c09a626ead792538e45c4d8f1f216c9b25dd807283a0cf6848abb43bcb65e0b7412e4f3f24abf1b6cce12057d6153205ff98226175a2cc9d5a5e4742696c00ef3de6b4cfe98cd6064b4f08498b6a004be49a9c39b1ab83fa0ff3629456a242da71e6b6b3d14dd0237dfdb7ac431caac0416eccf830cbfb26ad7ffb6aa160bfe30182446aed7201500993e1182f4f0036ba43131b2e84bb930906355d1ddb707cbdf6e047606e845216063d55a261e1f47f17e05abfaaa88099e8a0f0ec10dbcee394cc953fac5f3b9d22df3596531b7ca5351f618f0971619f69e612e74e95af6e1fa2f2be0fcc7c15541eb02c123e5b810cb827d5a40a73504d80634e058230701a5f377057757c0bdab5f090368a78c4dd2b5aa6551e1e6df708ebcda42289c44d0f1c5d5fcfb86c45c4b76863be1e434eef94d3b8fc2af4d40142494b65791108337cdf1213ab6a9ac9e6f3776a43ccc7637dd2e54453641c391303cfb5b8e00d16d1658977722743df41bfefad147d05f38d39bcd9f929a506f45173083826a3c9c992f03d91e1aa66aa97ef04670b036adbed0e2e9940363508056e30c4867cf9d2c6bda5babc6bd95df31889e49a038a7d2ee00c1366c86bd2a30004e7fbc36641d2a091b36474bd66203fba8237dd5bccf6bc3302511e803a43a365e59824ec7b07fcae56b3ef456253a260c232e9566ff3993fd5d5006a986b64deff25850bceb035d460b53b0564cb4b1bb2c586fd019651926d06dd6eacfd2a43fc4bafa4fa2f637e98eadb9754efe29cd5ba4427e315b28e33a28593473b4f1072840cb9ce2affb14b1bc897694ed6f8d0fa0ad4ca53c8271ec217b5cebf00793aee3f2600f7082e38bfa1ab5844605adb96708f9a7234e1c01ddb8faab790a6fe32cc4518392b7396ea59fced19938907d049153f7c5f9d87f028fcc00698de325dbfd34468c30469d8488fb06205ba156f22b6ab7e5aa7a5ae2f00200045f30bdb40b75bbaff038a011e74beff5dc04646b8cb970dcdd74f236fef6ec6e022cc047c48393ef80c3ca63236af7953ea2028ab300b0fc38fa75cf94c533dc41f1ec92320c6de77fb55ec02560cfa4d694e0705dfbb6968c66e59662bf175a70a0f57821c3cbdf59d2f8fd602f4f01896f9215b0133f390d50df2c0fe7e9385820ae56d46e5f2e23e9387c135bf5969aaa17f3c348f6235730198ac2bd57ec10768eb59425511c93432f9881845f539794e080989dc6605168c2fb89d790c66ea2f28958cdcea41ed5e05d292f80e65aeea4d126128c12556687aeb9c46288f1c9a0003c5e451900af822ba1fe03770ec9b09b13db639ad267886116b837017ce9a1275f42c24e5ccdef98d60b01fbd5a7011cedde11884e83d2f1812c621f795f6fa00825e974b5fb8e99a0a774ddb472dcf6f5825375d915c72db3a3c0daa18709d227df6c8b57e4c1336573f7bc7b8b91243905fb6ea9b521e47e5090cff2555117d47a26c0b1c3ae316cc5c31302941dca35f02f8e0f7ee4e000056a865fe2f1e1dd6192091f798fd483352210457b4f44bcd3a7f22b803a3f259a1243868c0268afaf4c546a6283c9e00f7209a83dcffe86ae8b6a4263b00582515604935c4edacf3a94fd4adf167b71d8d5ba94c94735088a29f78758fd3a929ce372ed822f6f6d08c18827062210254eb2d216016a4e4ce19bc88aecd1fe878cef0b0abcaca2fc224be67d5d62a2179aff3dae3550a9210765116a5eaaa79281840b6ab8d3c66e7071c8c1bc2871bf53c69aaff66400f3ffeae24d34fe1d65a11002c0d94eda2b3b0f84bc769a5029b9c31c7cf779353ddfc41605b2c6b236657856ed393f9d9af4b4eba64ac608306d466dd457c1ddd045570334a4f9ad275933c53fc3dbe14ec8dfb052dae1074bf89aa928626da4e18e5ecb049548239ab7126401310e81512abb26a88940609ff53fe8d866fd5f646645d8bb4ff9e689f769e2a99db6f0c2518de43d3a611135d253e0732672ffee0e74a14d2a0c26635b112eda431f1ba367b84ce1c0d4119687327d1c0576f2b7642c19b84090e5ce7d3bc349a4b6fe749dfd2f0bb9845382e7e0879fea3c4540c3839d4f4059eb79a7616de0a1bfa977efab83e64bbcd4d61268defa0f8af9d8fb82c62f496be23622dbb76450f6a05f3818eb91cf609f1c69181ecc707562b58fd6e1eb44d8b00860ba3f051d1fd877002d21e3f54a9dbe38614dfdee552c7bab7d026f783b4735928cc0cc44f7c903baba0cfec33e9a549c36e7381cbad164a13eb8c5190795aa0cd33c30323594834d19b6afc6c8ad9791748def935647874c9865dbc96ebfb130c4313e297ed2da8a26f79b698065ab4c0a6c77c768ebe0f1e09c62221b6216a059b3c2650750618018931adcff905b866b56a92988dcef4a5ae3cc1bfffaaca8cab80a1e6d25a204b8967c3c0a70f54087e30018a33cacff084093bbbf07a4d9eb73e3eec50c7fd4c0ce7c65bccbc44f61f53727d6c733a0e633dbe4854e70ba855661297ef8029a83aacd515a9030e8f5f1b8ce9f4281fa00a3d763cde72c0b7523db791372850175543f4de6ef4b079e697456c740e0dc11987f8e9cdd1f4243cc06d1b4c49ced743fbf98eafb9afb2d3cb63044ebc9ed9c0741fde1a43b659ef6c186f6e50c7426fa2f6069304e6e284f34aa67727348641f687679ff130fe861c62f30f03c3b383eafa2d29e2cf79e9989ff074e17318e5b9c9517a8bede114a2f53a9b6b4c0a132774429665ab14981152f0ae8dfbf4c1d29620099486dea6d88b8abda07ab71026d0d7c9fefeb91a21f077ed18ce7dc74e5752293685f233181b708658e3ae3457bf4ccf5daf7b95f9956edb31af3760ef9898b2026d57d3c395642792fecedc7f4b0f51bd5a337a15bd71c365d2eb33cea5e37280d6cab3e966fcd13e07f290c5c5cb650ce0c92150d17be5435099ec49499396097ac757e0a33ff3f2f8c5ff7e33c6373f087213edb90cb8dbf1fb3a3882a7a201e76b3918dadd0a424e2d92ed7a19cfd0d54846b6737e9ac75e355123e0811729109ad2d6d5383df72a1694714b3133737745ce54f1c5cac9cb93ea7b7ebe90731b9b76add81c90a09d13e8d1fda2f6c44f5c64966e9240e58f379674c7fd9d4722eed7ab44ac48d35f976fbe4f210972abcfbda00dfff32269f104dccdccc2dd0b41dcfcc9dd9595bb2de78de66dbcedf73cb9af8e9a3e9576ed745679756e39533ab7bc4a0a64e34328790ebf819e6a6922b2766c13331c489d0bae3f4aba2c4a05c41bfc8fdbe3a16c43079f5cf2c69944fac5639ac7a12e8c0bcc71c645b2aba7f7603d3233e28f6d71b2a5164feaff8a2aca5e0fb33e016bf3bdb688ad32d75dd82685a89cd2743c981f5e2bbab0913686c602cf0529e2585b092a589c80983775fe47aa96eadeb37956025f75c7a2f732283359363bc8339e9d6b190327a7b4062b704e0f99910f8fe40a2e784035ef56e9b226c93f8a5d9808a007e6bd1e3ec88d05dcf30827feda8c7b6b028429a7d21241cbd37d69918df715df123a6121dc20a31d03b6e5fdebfef9f7af9246e4da6cfd4ecf18be90d7a0ef50f9aacf0bdfbeda2a057a9f8a04e8a91fdb194dfb5c0abce88860e8050b0f3eb91615491ffb4df129b3adc358c3dc75f939a8d55437b493d9a89a6178aaaa69b88378b8cc5d0635f9f3ab4f52d3bb194113e53e41918ccf0863e319f04d0a4b6718bd32d35db03e85a2a1fcddeb4ecd18460766516385a8491e6fcdb7fb4e02c0bc917b452fedb2d3fd0d1c831e20d48f657d59b988577a3cede784cafcc2e9a868e09efad7e558374c3ef1c7b1d25392580ba9bb91cf38291a0194db48028bac306fbb6f0831b6cc69175d1d4b02126fe8cbf564e53bfb90a4513d8912cb0d8284132f0c8eb75a8fb2fd93fe12d928595289703f86dde66dd6cf5ac0796abd9a7abb2dcd92a2799def5c3c9762d553d61538f733a24e511b0f84a2260eccd646670df825a6a0b6f5cbe7f847c34a20382bb1e4f6cff93df45c2daed825919948c644eab2510192396f53b85906811816968aa5726beba0648f6a88b3b95d20777a772fe60ddb8733fbb71b82ff0c8be9d171dff549b9d361a1eb4ef88c2a898734801d2a7d5015743ccfcc00bf8a9af5974", 0x1000}, 0x1, 0x0, 0x0, 0x15}, 0x20000004) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000080)={r4}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ff65"]) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x9b, &(0x7f00000000c0)=0x1) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ff65"]) (async) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x9b, &(0x7f00000000c0)=0x1) (async) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 0: r0 = geteuid() mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setuid(r1) 20:42:20 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ff65"]) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x9b, &(0x7f00000000c0)=0x1) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ff65"]) (async) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x9b, &(0x7f00000000c0)=0x1) (async) 20:42:20 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 0: r0 = geteuid() mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setuid(r1) geteuid() (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) setuid(r1) (async) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x30000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="77d5a07703b50761df250a0000000c000600020000000200000008000300", @ANYRES32=r2, @ANYBLOB="0c00060000000000000000000c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4008040}, 0x40004) (async, rerun: 32) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000040)={r4}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r6) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16=r7, @ANYRES32=r1, @ANYBLOB="7c4fb9e3e2cea963e466cc0f632350af0cbf65b6fb826655abef070f36b533ce6928b8304b6df251a835a371a6124c20090bb8b31228b8df23b80fa4d865af71bf60767dedaa4739925eaa0aa84a754d942cd79b9c4a012dd3a833367bfc0a82b542327884cb28a37d8da90b5ca47f86c8a7325797bbd53635498263eebda4d9f5ea5043d514b37a635ee5047746203ef4a8e0c63b12b6dcd63d7d669bc63ff98601980375ec2080ed75febb20262397b4cb976db53a86c38c2b69fd85d182f7110dfabed520378ae05d8b3ca6b2f2c4112c9f7996c24d9f1552ac5daf476ee57c8e6b7132b23f2192d405ffd2e246535e9b", @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) sendmsg$NL802154_CMD_SET_CHANNEL(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="00022abd7000fbdbdf25090000000c00060003000000030000000500080018000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4c010) ioctl$TCSETS2(r5, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0xffffffff, 0x81, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000140)={r9}) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, @none={0x0, 0x1}}, 0x14, &(0x7f0000000400)={&(0x7f0000001740)="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", 0x1000}, 0x1, 0x0, 0x0, 0x15}, 0x20000004) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000080)={r4}) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:20 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0xe00}}]}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x6, 0x7, 0x6, 0x1d04, 0x1, 0xffff8000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:20 executing program 0: r0 = geteuid() mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setuid(r1) geteuid() (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) setuid(r1) (async) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0xe00}}]}}) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x6, 0x7, 0x6, 0x1d04, 0x1, 0xffff8000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000480), 0x0, 0x14400) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000000c0)={0x3}) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x601d, 0x5, 0x383a}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000001c0)={0x3, 0x9, 0x8}) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0xa2001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0xe00}}]}}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x6, 0x7, 0x6, 0x1d04, 0x1, 0xffff8000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000000c0)={0x3}) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x601d, 0x5, 0x383a}) (async, rerun: 64) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000001c0)={0x3, 0x9, 0x8}) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0xa2001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x80081) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 3: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x42002, &(0x7f0000004500)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x79}}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@allow_other}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/loop0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'v\x9cj\xbf\x06\x00\x00\x00'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) 20:42:20 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d357b1f77f3866f09548c2e146a4efd281385a8431451ec7b96f5a368d782818c162120f52ac2018744249b5342b300b4307855878ecf9a4ca10e395def45de77a35cf050e24af779b5c546a93bae5921de70de38d0062eb114e4ba2c2b3760c1f4a3596a3891a3cf1a88e95fbc103a5a82b8600caf0483d141ebc493ab706baf2750531f735a0acdd6fa1aa775", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000500)={0x0, 0x1}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x10610f0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7a}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x4}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@euid_lt={'euid<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x32, 0x65, 0x3b, 0x0, 0x62], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x61, 0x39, 0x64, 0x31], 0x2d, [0x35, 0x37, 0x35, 0xa], 0x2d, [0x39, 0x66, 0x34, 0x55, 0x37, 0x64, 0x35, 0x35]}}}, {@measure}, {@subj_role}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:42:20 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:20 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:20 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000000c0)={0x3}) (async) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x601d, 0x5, 0x383a}) (async, rerun: 64) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000001c0)={0x3, 0x9, 0x8}) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0xa2001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (rerun: 32) 20:42:20 executing program 3: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x42002, &(0x7f0000004500)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x79}}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@allow_other}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/loop0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'v\x9cj\xbf\x06\x00\x00\x00'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020}, 0x2020) (async) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x42002, &(0x7f0000004500)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x79}}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@allow_other}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/loop0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'v\x9cj\xbf\x06\x00\x00\x00'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) (async) 20:42:20 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d357b1f77f3866f09548c2e146a4efd281385a8431451ec7b96f5a368d782818c162120f52ac2018744249b5342b300b4307855878ecf9a4ca10e395def45de77a35cf050e24af779b5c546a93bae5921de70de38d0062eb114e4ba2c2b3760c1f4a3596a3891a3cf1a88e95fbc103a5a82b8600caf0483d141ebc493ab706baf2750531f735a0acdd6fa1aa775", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000500)={0x0, 0x1}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x10610f0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7a}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x4}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@euid_lt={'euid<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x32, 0x65, 0x3b, 0x0, 0x62], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x61, 0x39, 0x64, 0x31], 0x2d, [0x35, 0x37, 0x35, 0xa], 0x2d, [0x39, 0x66, 0x34, 0x55, 0x37, 0x64, 0x35, 0x35]}}}, {@measure}, {@subj_role}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d357b1f77f3866f09548c2e146a4efd281385a8431451ec7b96f5a368d782818c162120f52ac2018744249b5342b300b4307855878ecf9a4ca10e395def45de77a35cf050e24af779b5c546a93bae5921de70de38d0062eb114e4ba2c2b3760c1f4a3596a3891a3cf1a88e95fbc103a5a82b8600caf0483d141ebc493ab706baf2750531f735a0acdd6fa1aa775", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) getresuid(&(0x7f0000000180), &(0x7f00000002c0), &(0x7f0000000300)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000500)={0x0, 0x1}) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x10610f0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7a}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x4}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@euid_lt={'euid<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x32, 0x65, 0x3b, 0x0, 0x62], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x61, 0x39, 0x64, 0x31], 0x2d, [0x35, 0x37, 0x35, 0xa], 0x2d, [0x39, 0x66, 0x34, 0x55, 0x37, 0x64, 0x35, 0x35]}}}, {@measure}, {@subj_role}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) (async) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:21 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000a}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r2 = syz_open_dev$dri(&(0x7f00000000c0), 0x7ff2c1b9, 0x301000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000100)) 20:42:21 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x200000, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d357b1f77f3866f09548c2e146a4efd281385a8431451ec7b96f5a368d782818c162120f52ac2018744249b5342b300b4307855878ecf9a4ca10e395def45de77a35cf050e24af779b5c546a93bae5921de70de38d0062eb114e4ba2c2b3760c1f4a3596a3891a3cf1a88e95fbc103a5a82b8600caf0483d141ebc493ab706baf2750531f735a0acdd6fa1aa775", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000500)={0x0, 0x1}) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x10610f0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7a}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x4}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@euid_lt={'euid<', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x62, 0x32, 0x65, 0x3b, 0x0, 0x62], 0x2d, [0x32, 0x63, 0x30, 0x33], 0x2d, [0x61, 0x39, 0x64, 0x31], 0x2d, [0x35, 0x37, 0x35, 0xa], 0x2d, [0x39, 0x66, 0x34, 0x55, 0x37, 0x64, 0x35, 0x35]}}}, {@measure}, {@subj_role}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:21 executing program 4: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x42002, &(0x7f0000004500)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x79}}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@allow_other}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/loop0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'v\x9cj\xbf\x06\x00\x00\x00'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) 20:42:21 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 3: getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000024c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x42002, &(0x7f0000004500)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x79}}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@allow_other}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@measure}, {@dont_hash}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_type={'subj_type', 0x3d, '/dev/loop0\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt={'uid>', r1}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'v\x9cj\xbf\x06\x00\x00\x00'}}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}}) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r2 = syz_open_dev$dri(&(0x7f00000000c0), 0x7ff2c1b9, 0x301000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) syz_open_dev$dri(&(0x7f00000000c0), 0x7ff2c1b9, 0x301000) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000100)) (async) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f00000001c0)="ebc7624deccfc12744a713c3e79ccbdf6426bcd6c84e4673e483d82f4d8e2b237f5ab8b5b907e9ced46dcc7aa8a94fe4ce2bf398a696ab5061926f873775fe3bde76aa5870f50ad83165845ea0f0f7d00246f78b0a4de2d4fddc74e94f020d816f1b8869b4b79b91d4644655aab1206f3703ca6b9d16959506994c9c170f212e8ff25fade15d361e", &(0x7f0000000280)=""/150, &(0x7f0000000340)="e2a4d539bf39f7f7ba49c544266d3032e15bc19d318f0eda03c985978df96777dd75880edded192fbbcdfcd528d07d645d3239c2cbe2ea6265de034d0217e1e1b75bfcc56291ee13ab56859318607c2f", &(0x7f00000003c0)="18134830656c551ce068df21a355fd856700b2c56826b386c4924aae009f9a2282a850c52d52a939ac06ee81905ea288dfab479a6fa028b1671687fd5229f1b5426b1ad0667dc00a30918bd504839a919f556b89561e867c0fcafcf53507a981e4d16ef2148674d0ff750df5df9b56e92cf4939135c3776f3d61b94d69972d475490c147039f38135a", 0x1, 0x1}, 0x38) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0xe8800, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x402240) 20:42:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) 20:42:21 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r2 = syz_open_dev$dri(&(0x7f00000000c0), 0x7ff2c1b9, 0x301000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000100)) 20:42:21 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f00000001c0)="ebc7624deccfc12744a713c3e79ccbdf6426bcd6c84e4673e483d82f4d8e2b237f5ab8b5b907e9ced46dcc7aa8a94fe4ce2bf398a696ab5061926f873775fe3bde76aa5870f50ad83165845ea0f0f7d00246f78b0a4de2d4fddc74e94f020d816f1b8869b4b79b91d4644655aab1206f3703ca6b9d16959506994c9c170f212e8ff25fade15d361e", &(0x7f0000000280)=""/150, &(0x7f0000000340)="e2a4d539bf39f7f7ba49c544266d3032e15bc19d318f0eda03c985978df96777dd75880edded192fbbcdfcd528d07d645d3239c2cbe2ea6265de034d0217e1e1b75bfcc56291ee13ab56859318607c2f", &(0x7f00000003c0)="18134830656c551ce068df21a355fd856700b2c56826b386c4924aae009f9a2282a850c52d52a939ac06ee81905ea288dfab479a6fa028b1671687fd5229f1b5426b1ad0667dc00a30918bd504839a919f556b89561e867c0fcafcf53507a981e4d16ef2148674d0ff750df5df9b56e92cf4939135c3776f3d61b94d69972d475490c147039f38135a", 0x1, 0x1}, 0x38) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0xe8800, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x402240) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f00000001c0)="ebc7624deccfc12744a713c3e79ccbdf6426bcd6c84e4673e483d82f4d8e2b237f5ab8b5b907e9ced46dcc7aa8a94fe4ce2bf398a696ab5061926f873775fe3bde76aa5870f50ad83165845ea0f0f7d00246f78b0a4de2d4fddc74e94f020d816f1b8869b4b79b91d4644655aab1206f3703ca6b9d16959506994c9c170f212e8ff25fade15d361e", &(0x7f0000000280)=""/150, &(0x7f0000000340)="e2a4d539bf39f7f7ba49c544266d3032e15bc19d318f0eda03c985978df96777dd75880edded192fbbcdfcd528d07d645d3239c2cbe2ea6265de034d0217e1e1b75bfcc56291ee13ab56859318607c2f", &(0x7f00000003c0)="18134830656c551ce068df21a355fd856700b2c56826b386c4924aae009f9a2282a850c52d52a939ac06ee81905ea288dfab479a6fa028b1671687fd5229f1b5426b1ad0667dc00a30918bd504839a919f556b89561e867c0fcafcf53507a981e4d16ef2148674d0ff750df5df9b56e92cf4939135c3776f3d61b94d69972d475490c147039f38135a", 0x1, 0x1}, 0x38) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0xe8800, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x402240) (async) 20:42:21 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) (async) 20:42:21 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000180)=0x6, 0x2) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) setsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f00000000c0)="e08b605f9d0f190f22dd9ceaea67cf0176189763e980c150df1abc7f6e2e7d5e6b368182a490f368880b81681f8263e512ab6d8504b8a3abdbff5ace74dfa8a9242130abab958f1d23cbc29305352b5a52a4c4ea0dcf60bab1cb7ffacbb43e687b1604fbe2fafac6564675da", 0x6c) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:21 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="77d5a07703b50761df250a0000000c000600020000000200000008000300", @ANYRES32=r2, @ANYBLOB="0c00060000000000000000000c0006000100000001000000"], 0x40}, 0x1, 0x0, 0x0, 0x4008040}, 0x40004) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000040)={r4}) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r6) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000500), r0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16=r7, @ANYRES32=r1, @ANYBLOB="7c4fb9e3e2cea963e466cc0f632350af0cbf65b6fb826655abef070f36b533ce6928b8304b6df251a835a371a6124c20090bb8b31228b8df23b80fa4d865af71bf60767dedaa4739925eaa0aa84a754d942cd79b9c4a012dd3a833367bfc0a82b542327884cb28a37d8da90b5ca47f86c8a7325797bbd53635498263eebda4d9f5ea5043d514b37a635ee5047746203ef4a8e0c63b12b6dcd63d7d669bc63ff98601980375ec2080ed75febb20262397b4cb976db53a86c38c2b69fd85d182f7110dfabed520378ae05d8b3ca6b2f2c4112c9f7996c24d9f1552ac5daf476ee57c8e6b7132b23f2192d405ffd2e246535e9b", @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r7, @ANYBLOB="00022abd7000fbdbdf25090000000c00060003000000030000000500080018000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4c010) ioctl$TCSETS2(r5, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000100)={0xffffffff, 0x81, 0x80, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000140)={r9}) sendmsg$802154_dgram(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, @none={0x0, 0x1}}, 0x14, &(0x7f0000000400)={&(0x7f0000001740)="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", 0x1000}, 0x1, 0x0, 0x0, 0x15}, 0x20000004) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f0000000080)={r4}) 20:42:21 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f00000001c0)="ebc7624deccfc12744a713c3e79ccbdf6426bcd6c84e4673e483d82f4d8e2b237f5ab8b5b907e9ced46dcc7aa8a94fe4ce2bf398a696ab5061926f873775fe3bde76aa5870f50ad83165845ea0f0f7d00246f78b0a4de2d4fddc74e94f020d816f1b8869b4b79b91d4644655aab1206f3703ca6b9d16959506994c9c170f212e8ff25fade15d361e", &(0x7f0000000280)=""/150, &(0x7f0000000340)="e2a4d539bf39f7f7ba49c544266d3032e15bc19d318f0eda03c985978df96777dd75880edded192fbbcdfcd528d07d645d3239c2cbe2ea6265de034d0217e1e1b75bfcc56291ee13ab56859318607c2f", &(0x7f00000003c0)="18134830656c551ce068df21a355fd856700b2c56826b386c4924aae009f9a2282a850c52d52a939ac06ee81905ea288dfab479a6fa028b1671687fd5229f1b5426b1ad0667dc00a30918bd504839a919f556b89561e867c0fcafcf53507a981e4d16ef2148674d0ff750df5df9b56e92cf4939135c3776f3d61b94d69972d475490c147039f38135a", 0x1, 0x1}, 0x38) (async, rerun: 32) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0xe8800, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async, rerun: 32) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x402240) 20:42:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) 20:42:21 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000180)=0x6, 0x2) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) setsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f00000000c0)="e08b605f9d0f190f22dd9ceaea67cf0176189763e980c150df1abc7f6e2e7d5e6b368182a490f368880b81681f8263e512ab6d8504b8a3abdbff5ace74dfa8a9242130abab958f1d23cbc29305352b5a52a4c4ea0dcf60bab1cb7ffacbb43e687b1604fbe2fafac6564675da", 0x6c) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) pipe2$watch_queue(&(0x7f0000000140), 0x80) (async) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000180)=0x6, 0x2) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r3, 0x402c542b, 0x0) (async) setsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f00000000c0)="e08b605f9d0f190f22dd9ceaea67cf0176189763e980c150df1abc7f6e2e7d5e6b368182a490f368880b81681f8263e512ab6d8504b8a3abdbff5ace74dfa8a9242130abab958f1d23cbc29305352b5a52a4c4ea0dcf60bab1cb7ffacbb43e687b1604fbe2fafac6564675da", 0x6c) (async) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:21 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6600f0", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) 20:42:21 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:21 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2000, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030302c7c3b15e5fd9d318f0000000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000180)=0x6, 0x2) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) (async, rerun: 64) setsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f00000000c0)="e08b605f9d0f190f22dd9ceaea67cf0176189763e980c150df1abc7f6e2e7d5e6b368182a490f368880b81681f8263e512ab6d8504b8a3abdbff5ace74dfa8a9242130abab958f1d23cbc29305352b5a52a4c4ea0dcf60bab1cb7ffacbb43e687b1604fbe2fafac6564675da", 0x6c) (rerun: 64) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_gt}]}}) 20:42:21 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6600f0", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async, rerun: 32) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) (rerun: 32) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4000050) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x2, 0x2, 0x100, 0x1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xf}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:21 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:21 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:21 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:21 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2000, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030302c7c3b15e5fd9d318f0000000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4000050) 20:42:21 executing program 5: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) socket$inet(0x2, 0x80000, 0x3) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x7, 0x4, 0x1, 0xfc, 0x2}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:21 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_GET_GROUP_NUM(0xffffffffffffffff, 0x8004af81, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x2, 0x2, 0x100, 0x1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xf}, 0x48) (rerun: 32) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:21 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2000, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030302c7c3b15e5fd9d318f0000000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:21 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6600f0", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x4000050) 20:42:21 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x84c000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x2, 0x2, 0x100, 0x1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0xf}, 0x48) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4001, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:21 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:21 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x7, &(0x7f0000000400)=0x1) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0}, 0xfeaf) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x103401, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0xfff9, 0x5733, 0x4, 0x4}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000003780)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="3c00004000ee938e9218524346c8b38a5d2382beaeb061c9f39b000000000000", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r5, 0x402c542b, 0x0) r6 = socket$inet(0x2, 0x800, 0x5) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x3}, 0x4) 20:42:21 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000080), 0x5e16, 0x101203) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000180)={0x3, r3}) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(r3, 0xc01064c1, &(0x7f00000001c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000140)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=0x3, 0x4) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x84c000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:21 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:21 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000080), 0x5e16, 0x101203) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000180)={0x3, r3}) (async) ioctl$TCSETS2(r3, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(r3, 0xc01064c1, &(0x7f00000001c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000140)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=0x3, 0x4) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:21 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:21 executing program 0: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x84c000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x84c000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:22 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x7, &(0x7f0000000400)=0x1) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0}, 0xfeaf) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x103401, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0xfff9, 0x5733, 0x4, 0x4}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000003780)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="3c00004000ee938e9218524346c8b38a5d2382beaeb061c9f39b000000000000", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r5, 0x402c542b, 0x0) r6 = socket$inet(0x2, 0x800, 0x5) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x3}, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x7, &(0x7f0000000400)=0x1) (async) read$FUSE(r0, &(0x7f0000001740)={0x2020}, 0xfeaf) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x103401, 0x0) (async) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0xfff9, 0x5733, 0x4, 0x4}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) (async) read$FUSE(r0, &(0x7f0000003780)={0x2020}, 0x2020) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="3c00004000ee938e9218524346c8b38a5d2382beaeb061c9f39b000000000000", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r5, 0x402c542b, 0x0) (async) socket$inet(0x2, 0x800, 0x5) (async) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x3}, 0x4) (async) 20:42:22 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) r2 = syz_open_dev$dri(&(0x7f0000000080), 0x5e16, 0x101203) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000180)={0x3, r3}) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_FD(r3, 0xc01064c1, &(0x7f00000001c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r2, 0xc01064c2, &(0x7f0000000140)={0x0, 0x0, r3}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=0x3, 0x4) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:22 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:22 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x7, 0xffffe000, 0xe1, 0x4, 0x80, "6122d60b78569700b49b0de68446fa04f027ec", 0x7fff, 0x4}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000001c0)={0xa7, 0x10000, 0x9, 0xfffffc01, 0x9, "ee4e115188c66bc76b99e59fa48de43385f956", 0x1, 0x9d}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB='ootmode=00000000000000000040000,user_id=', @ANYRES8=r2, @ANYBLOB=',group_id=', @ANYRES64=r2, @ANYBLOB]) 20:42:22 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:22 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) connect$802154_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 20:42:22 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x7, 0xffffe000, 0xe1, 0x4, 0x80, "6122d60b78569700b49b0de68446fa04f027ec", 0x7fff, 0x4}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000001c0)={0xa7, 0x10000, 0x9, 0xfffffc01, 0x9, "ee4e115188c66bc76b99e59fa48de43385f956", 0x1, 0x9d}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB='ootmode=00000000000000000040000,user_id=', @ANYRES8=r2, @ANYBLOB=',group_id=', @ANYRES64=r2, @ANYBLOB]) 20:42:22 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:22 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async, rerun: 32) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x7, &(0x7f0000000400)=0x1) (async, rerun: 32) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0}, 0xfeaf) (async, rerun: 32) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x103401, 0x0) (rerun: 32) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0xfff9, 0x5733, 0x4, 0x4}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000003780)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="3c00004000ee938e9218524346c8b38a5d2382beaeb061c9f39b000000000000", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) (async, rerun: 64) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (rerun: 64) ioctl$TCSETS2(r5, 0x402c542b, 0x0) (async) r6 = socket$inet(0x2, 0x800, 0x5) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x3}, 0x4) 20:42:22 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) connect$802154_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) connect$802154_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) 20:42:22 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x7, 0xffffe000, 0xe1, 0x4, 0x80, "6122d60b78569700b49b0de68446fa04f027ec", 0x7fff, 0x4}) (async) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000001c0)={0xa7, 0x10000, 0x9, 0xfffffc01, 0x9, "ee4e115188c66bc76b99e59fa48de43385f956", 0x1, 0x9d}) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000000c0)) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB='ootmode=00000000000000000040000,user_id=', @ANYRES8=r2, @ANYBLOB=',group_id=', @ANYRES64=r2, @ANYBLOB]) 20:42:22 executing program 5: getresuid(0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:22 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:22 executing program 5: getresuid(0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:22 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 20:42:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x0, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:22 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) connect$802154_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) connect$802154_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x24, @short={0x2, 0x2, 0xaaa1}}, 0x14) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) 20:42:23 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r3, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRES8=r0, @ANYRES16=r3, @ANYRES16=r1, @ANYRES8=r2, @ANYRESDEC=r2]) 20:42:23 executing program 5: getresuid(0x0, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x0, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) (async) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) (async) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000400)) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000080)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000280)={r4}) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x8001, 0x8080) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x4, 0x5}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000100)="288b2a5bb5318bed34368150684486c150e363480d514ee33d67fa9b0a91176b5015bef934f7d8c5a3c4f6c8e10c16c17dced31755a64dd5db103184cf2601dc7b9556775f274ad5e117e24a463cd3e9068c7ad3bcb956ad730549d3f8c525d97831a13d6bec95311582615f180dbeb6934ca9a394", &(0x7f0000000180)=""/28, &(0x7f0000000480)="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", &(0x7f00000001c0)="64f3b07ad99de61a8e8a8dfecb2b3dc849e149bd25db938ab14acaf92c53bf8ab1be43c28e45b704", 0x6, 0x1}, 0x38) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000001480)={0x4, 0xc1, 0xb6ee}) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f00000000c0)=0xffffffbf, 0x4) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), 0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r3, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRES8=r0, @ANYRES16=r3, @ANYRES16=r1, @ANYRES8=r2, @ANYRESDEC=r2]) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x0, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000400)) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000080)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000280)={r4}) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x8001, 0x8080) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x4, 0x5}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000100)="288b2a5bb5318bed34368150684486c150e363480d514ee33d67fa9b0a91176b5015bef934f7d8c5a3c4f6c8e10c16c17dced31755a64dd5db103184cf2601dc7b9556775f274ad5e117e24a463cd3e9068c7ad3bcb956ad730549d3f8c525d97831a13d6bec95311582615f180dbeb6934ca9a394", &(0x7f0000000180)=""/28, &(0x7f0000000480)="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", &(0x7f00000001c0)="64f3b07ad99de61a8e8a8dfecb2b3dc849e149bd25db938ab14acaf92c53bf8ab1be43c28e45b704", 0x6, 0x1}, 0x38) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000001480)={0x4, 0xc1, 0xb6ee}) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f00000000c0)=0xffffffbf, 0x4) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000400)) (async) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000080)={r4}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000280)={r4}) (async) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) (async) syz_open_dev$dri(&(0x7f0000000380), 0x8001, 0x8080) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x4, 0x5}) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000100)="288b2a5bb5318bed34368150684486c150e363480d514ee33d67fa9b0a91176b5015bef934f7d8c5a3c4f6c8e10c16c17dced31755a64dd5db103184cf2601dc7b9556775f274ad5e117e24a463cd3e9068c7ad3bcb956ad730549d3f8c525d97831a13d6bec95311582615f180dbeb6934ca9a394", &(0x7f0000000180)=""/28, &(0x7f0000000480)="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", &(0x7f00000001c0)="64f3b07ad99de61a8e8a8dfecb2b3dc849e149bd25db938ab14acaf92c53bf8ab1be43c28e45b704", 0x6, 0x1}, 0x38) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000001480)={0x4, 0xc1, 0xb6ee}) (async) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f00000000c0)=0xffffffbf, 0x4) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) (async) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) (async) 20:42:23 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async, rerun: 32) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 32) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) (async) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r3, 0x4008af7c, 0x0) (async, rerun: 64) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRES8=r0, @ANYRES16=r3, @ANYRES16=r1, @ANYRES8=r2, @ANYRESDEC=r2]) (rerun: 64) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x0, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), 0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000400)) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000080)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000280)={r4}) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x8001, 0x8080) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x4, 0x5}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000100)="288b2a5bb5318bed34368150684486c150e363480d514ee33d67fa9b0a91176b5015bef934f7d8c5a3c4f6c8e10c16c17dced31755a64dd5db103184cf2601dc7b9556775f274ad5e117e24a463cd3e9068c7ad3bcb956ad730549d3f8c525d97831a13d6bec95311582615f180dbeb6934ca9a394", &(0x7f0000000180)=""/28, &(0x7f0000000480)="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", &(0x7f00000001c0)="64f3b07ad99de61a8e8a8dfecb2b3dc849e149bd25db938ab14acaf92c53bf8ab1be43c28e45b704", 0x6, 0x1}, 0x38) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000001480)={0x4, 0xc1, 0xb6ee}) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f00000000c0)=0xffffffbf, 0x4) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000400)) (async) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000080)={r4}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000280)={r4}) (async) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) (async) syz_open_dev$dri(&(0x7f0000000380), 0x8001, 0x8080) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f00000003c0)={0x4, 0x5}) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000100)="288b2a5bb5318bed34368150684486c150e363480d514ee33d67fa9b0a91176b5015bef934f7d8c5a3c4f6c8e10c16c17dced31755a64dd5db103184cf2601dc7b9556775f274ad5e117e24a463cd3e9068c7ad3bcb956ad730549d3f8c525d97831a13d6bec95311582615f180dbeb6934ca9a394", &(0x7f0000000180)=""/28, &(0x7f0000000480)="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", &(0x7f00000001c0)="64f3b07ad99de61a8e8a8dfecb2b3dc849e149bd25db938ab14acaf92c53bf8ab1be43c28e45b704", 0x6, 0x1}, 0x38) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000001480)={0x4, 0xc1, 0xb6ee}) (async) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f00000000c0)=0xffffffbf, 0x4) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x0, 0x0, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d942fb447f8776dc2055f06eea27065ba8ab379f5ca09f72c1be05acb9073a93b918fbb640a7f0bdc4c423ba0f2dc2beff8d75a747ac1c31b182088cc8465fd73c11ccd2b052a83cc0e000025afda1fcd94f8364fda0a9a04c67b7a3030c6d4e19f", @ANYRESHEX, @ANYBLOB="2c72653d30303030b03030302030303030303030303034303030302c757365725ffeff3d000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x10, 0x7, 0x5, 0x7, 0x42, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303030806096890a057e2251e5463ec751013030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB='?group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0xfffffe29) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x401, 0x2, 0x3, 0xa0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0xe}, 0x48) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x0) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), 0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x0, 0x0, {0xa, 0x0, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d942fb447f8776dc2055f06eea27065ba8ab379f5ca09f72c1be05acb9073a93b918fbb640a7f0bdc4c423ba0f2dc2beff8d75a747ac1c31b182088cc8465fd73c11ccd2b052a83cc0e000025afda1fcd94f8364fda0a9a04c67b7a3030c6d4e19f", @ANYRESHEX, @ANYBLOB="2c72653d30303030b03030302030303030303030303034303030302c757365725ffeff3d000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) ioctl$TCSETS2(r2, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x80000001, 0x0, 0xbf, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000001c0)={r6}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$restrict_keyring(0x1d, r7, 0x0, &(0x7f0000000200)='/dev/dri/card#\x00') 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x0, 0x0, {0xa, 0x0, 0x0, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x10, 0x7, 0x5, 0x7, 0x42, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303030806096890a057e2251e5463ec751013030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB='?group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0xfffffe29) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x401, 0x2, 0x3, 0xa0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0xe}, 0x48) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x0) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d942fb447f8776dc2055f06eea27065ba8ab379f5ca09f72c1be05acb9073a93b918fbb640a7f0bdc4c423ba0f2dc2beff8d75a747ac1c31b182088cc8465fd73c11ccd2b052a83cc0e000025afda1fcd94f8364fda0a9a04c67b7a3030c6d4e19f", @ANYRESHEX, @ANYBLOB="2c72653d30303030b03030302030303030303030303034303030302c757365725ffeff3d000000000000", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x80000001, 0x0, 0xbf, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)={r3}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) r5 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000080)={r6}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000001c0)={r6}) (async) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$restrict_keyring(0x1d, r7, 0x0, &(0x7f0000000200)='/dev/dri/card#\x00') 20:42:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x10, 0x7, 0x5, 0x7, 0x42, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303030806096890a057e2251e5463ec751013030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB='?group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0xfffffe29) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x401, 0x2, 0x3, 0xa0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0xe}, 0x48) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r2, 0x0) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x403, 0x0, 0x0, {}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 0: r0 = geteuid() r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getaddr={0x14, 0x16, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x4800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'fuseblk\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_role={'obj_role', 0x3d, '(*!'}}, {@seclabel}, {@dont_hash}]}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x2ba081, 0x0) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x20, 0x16, 0x403, 0x0, 0x0, {}, [@IFA_FLAGS={0x8, 0x8, 0x28}]}, 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 3: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64654630303030303030303030303030303030303030303030302c757375019569643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYBLOB="c75f7ea5c0203acd23f7b1549c1365eda788bc255344022412e7cfeecffe4d163b190d2d9a9051c43cee49e376b2e874d2350a239f960494cb90444ae50cbb1c7e9f3e9fa508e9e1031afa811f4051219f64e38a5b4f5155d27b23676be81515149a6beacd0c0f996b0e6fc2c473d005ab99ce6dbc805bf6997b3f76da7bfa1bdb1bd0e93602cd7831de151ba2fce08d094af311ad4507886753a91f3b3bff846d9fac49f2650ff88019feb264a3bb003ae3c6d59bc2d1ecebc414e69eb6c85318f9f7d35b2037eb4c", @ANYRES16=r0]) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) ioctl$TCSETS2(r2, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x80000001, 0x0, 0xbf, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)={r3}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000080)={r6}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000001c0)={r6}) r7 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) keyctl$restrict_keyring(0x1d, r7, 0x0, &(0x7f0000000200)='/dev/dri/card#\x00') syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000000c0)) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000180)=r2) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x80000001, 0x0, 0xbf}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000140)={r3}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r5, 0xc00464b4, &(0x7f0000000080)={r6}) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000001c0)={r6}) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r7) (async) keyctl$restrict_keyring(0x1d, r7, 0x0, &(0x7f0000000200)='/dev/dri/card#\x00') (async) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 0: r0 = geteuid() r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getaddr={0x14, 0x16, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x4800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'fuseblk\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_role={'obj_role', 0x3d, '(*!'}}, {@seclabel}, {@dont_hash}]}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x2ba081, 0x0) geteuid() (async) socket$nl_route(0x10, 0x3, 0x0) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getaddr={0x14, 0x16, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x4800) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'fuseblk\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_role={'obj_role', 0x3d, '(*!'}}, {@seclabel}, {@dont_hash}]}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x2ba081, 0x0) (async) 20:42:23 executing program 3: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) (async, rerun: 64) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 64) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64654630303030303030303030303030303030303030303030302c757375019569643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYBLOB="c75f7ea5c0203acd23f7b1549c1365eda788bc255344022412e7cfeecffe4d163b190d2d9a9051c43cee49e376b2e874d2350a239f960494cb90444ae50cbb1c7e9f3e9fa508e9e1031afa811f4051219f64e38a5b4f5155d27b23676be81515149a6beacd0c0f996b0e6fc2c473d005ab99ce6dbc805bf6997b3f76da7bfa1bdb1bd0e93602cd7831de151ba2fce08d094af311ad4507886753a91f3b3bff846d9fac49f2650ff88019feb264a3bb003ae3c6d59bc2d1ecebc414e69eb6c85318f9f7d35b2037eb4c", @ANYRES16=r0]) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x18, 0x16, 0x403}, 0x18}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:23 executing program 0: r0 = geteuid() (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getaddr={0x14, 0x16, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x4800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'fuseblk\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_role={'obj_role', 0x3d, '(*!'}}, {@seclabel}, {@dont_hash}]}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x2ba081, 0x0) 20:42:23 executing program 3: connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0102}}}, 0x14) (async, rerun: 32) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 32) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64654630303030303030303030303030303030303030303030302c757375019569643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYBLOB="c75f7ea5c0203acd23f7b1549c1365eda788bc255344022412e7cfeecffe4d163b190d2d9a9051c43cee49e376b2e874d2350a239f960494cb90444ae50cbb1c7e9f3e9fa508e9e1031afa811f4051219f64e38a5b4f5155d27b23676be81515149a6beacd0c0f996b0e6fc2c473d005ab99ce6dbc805bf6997b3f76da7bfa1bdb1bd0e93602cd7831de151ba2fce08d094af311ad4507886753a91f3b3bff846d9fac49f2650ff88019feb264a3bb003ae3c6d59bc2d1ecebc414e69eb6c85318f9f7d35b2037eb4c", @ANYRES16=r0]) 20:42:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) r4 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x10000) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x18, 0x16, 0x403}, 0x18}}, 0x4000050) 20:42:23 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:23 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) (async) r4 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x10000) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x18, 0x16, 0x403}, 0x18}}, 0x0) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 0: r0 = socket(0x9, 0x4, 0x6) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000340), 0x2) sendmsg$802154_dgram(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x14, &(0x7f00000000c0)={&(0x7f00000001c0)="a178e846357472cf29118919d97727d701002198b596dfb7e9cbadc99386fcf0e94d237675532cfee93828a91d06a8e30a29a0a11549ec5bedfd06c1fdfca36668ac47aaf686866c22db683658e083969b2573b7b105ec655433a1783157695f677cd7b82a2879316a66beb730ac3bd4555aa0e44ec3dc5cd1c697a6b2d21a8a07", 0x81}, 0x1, 0x0, 0x0, 0x800}, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',Zroup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0), 0x4100, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000380)=0xa8, &(0x7f00000003c0)=0x2) write$sequencer(r1, &(0x7f0000000300)=[@v={0x93, 0x0, 0x90, 0x19, @generic=0x9, 0x40, 0x7}, @echo=0x4, @n={0x3, 0xf, @generic=0x80, 0x7f}, @s={0x5, @generic=0x5, 0x8, 0x7}], 0x14) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) socket$inet_udplite(0x2, 0x2, 0x88) 20:42:24 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x2, 0x62dd, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000080)={r3}) (async) r4 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x10000) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000100)={r1}) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) socket$inet_udplite(0x2, 0x2, 0x88) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: r0 = socket(0x9, 0x4, 0x6) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000340), 0x2) (async) sendmsg$802154_dgram(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x14, &(0x7f00000000c0)={&(0x7f00000001c0)="a178e846357472cf29118919d97727d701002198b596dfb7e9cbadc99386fcf0e94d237675532cfee93828a91d06a8e30a29a0a11549ec5bedfd06c1fdfca36668ac47aaf686866c22db683658e083969b2573b7b105ec655433a1783157695f677cd7b82a2879316a66beb730ac3bd4555aa0e44ec3dc5cd1c697a6b2d21a8a07", 0x81}, 0x1, 0x0, 0x0, 0x800}, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',Zroup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0), 0x4100, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000380)=0xa8, &(0x7f00000003c0)=0x2) write$sequencer(r1, &(0x7f0000000300)=[@v={0x93, 0x0, 0x90, 0x19, @generic=0x9, 0x40, 0x7}, @echo=0x4, @n={0x3, 0xf, @generic=0x80, 0x7f}, @s={0x5, @generic=0x5, 0x8, 0x7}], 0x14) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}]}}) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 1: r0 = socket(0x9, 0x4, 0x6) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000340), 0x2) sendmsg$802154_dgram(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x14, &(0x7f00000000c0)={&(0x7f00000001c0)="a178e846357472cf29118919d97727d701002198b596dfb7e9cbadc99386fcf0e94d237675532cfee93828a91d06a8e30a29a0a11549ec5bedfd06c1fdfca36668ac47aaf686866c22db683658e083969b2573b7b105ec655433a1783157695f677cd7b82a2879316a66beb730ac3bd4555aa0e44ec3dc5cd1c697a6b2d21a8a07", 0x81}, 0x1, 0x0, 0x0, 0x800}, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',Zroup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0), 0x4100, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000380)=0xa8, &(0x7f00000003c0)=0x2) write$sequencer(r1, &(0x7f0000000300)=[@v={0x93, 0x0, 0x90, 0x19, @generic=0x9, 0x40, 0x7}, @echo=0x4, @n={0x3, 0xf, @generic=0x80, 0x7f}, @s={0x5, @generic=0x5, 0x8, 0x7}], 0x14) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) socket$inet_udplite(0x2, 0x2, 0x88) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}]}}) 20:42:24 executing program 0: r0 = socket(0x9, 0x4, 0x6) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000340), 0x2) sendmsg$802154_dgram(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x14, &(0x7f00000000c0)={&(0x7f00000001c0)="a178e846357472cf29118919d97727d701002198b596dfb7e9cbadc99386fcf0e94d237675532cfee93828a91d06a8e30a29a0a11549ec5bedfd06c1fdfca36668ac47aaf686866c22db683658e083969b2573b7b105ec655433a1783157695f677cd7b82a2879316a66beb730ac3bd4555aa0e44ec3dc5cd1c697a6b2d21a8a07", 0x81}, 0x1, 0x0, 0x0, 0x800}, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',Zroup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0), 0x4100, 0x0) (async) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000380)=0xa8, &(0x7f00000003c0)=0x2) write$sequencer(r1, &(0x7f0000000300)=[@v={0x93, 0x0, 0x90, 0x19, @generic=0x9, 0x40, 0x7}, @echo=0x4, @n={0x3, 0xf, @generic=0x80, 0x7f}, @s={0x5, @generic=0x5, 0x8, 0x7}], 0x14) 20:42:24 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 3: keyctl$set_timeout(0xf, 0x0, 0x10000) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}]}}) keyctl$get_keyring_id(0x0, 0x0, 0x1000) keyctl$describe(0x6, 0x0, &(0x7f0000000280)=""/150, 0x96) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xffffffffffff9fc1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}]}}) 20:42:24 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xffffffffffff9fc1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}]}}) 20:42:24 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 3: keyctl$set_timeout(0xf, 0x0, 0x10000) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}]}}) keyctl$get_keyring_id(0x0, 0x0, 0x1000) keyctl$describe(0x6, 0x0, &(0x7f0000000280)=""/150, 0x96) keyctl$set_timeout(0xf, 0x0, 0x10000) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}]}}) (async) keyctl$get_keyring_id(0x0, 0x0, 0x1000) (async) keyctl$describe(0x6, 0x0, &(0x7f0000000280)=""/150, 0x96) (async) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xffffffffffff9fc1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xffffffffffff9fc1}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}]}}) (async) 20:42:24 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 3: keyctl$set_timeout(0xf, 0x0, 0x10000) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}]}}) keyctl$get_keyring_id(0x0, 0x0, 0x1000) (async) keyctl$describe(0x6, 0x0, &(0x7f0000000280)=""/150, 0x96) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:24 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x0, r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x103e02, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000800)={0x2, 0x1, 0x18, 0x13, 0x6e, &(0x7f0000000400)="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"}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1002000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@dont_hash}, {@audit}, {@subj_user={'subj_user', 0x3d, '-:,'}}, {@uid_lt={'uid<', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000c40)={0x2, 0x1, 0xb, 0x16, 0x55, &(0x7f0000000840)="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"}) 20:42:24 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) (async) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getaddr={0x28, 0x16, 0x0, 0x1, 0x25dfdbfc, {0xa, 0x1f, 0x8, 0xc8}, [@IFA_FLAGS={0x8, 0x8, 0x28}, @IFA_FLAGS={0x8, 0x8, 0x60}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x103e02, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000800)={0x2, 0x1, 0x18, 0x13, 0x6e, &(0x7f0000000400)="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"}) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1002000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@dont_hash}, {@audit}, {@subj_user={'subj_user', 0x3d, '-:,'}}, {@uid_lt={'uid<', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000c40)={0x2, 0x1, 0xb, 0x16, 0x55, &(0x7f0000000840)="54c682078a538beaf8ff7005654543391354430ea026a699e7a96c0f7162dc877d52c419942b5ea7b6b3ca4ca8dc6ba7dee1792208da7221d38eadd82859a1ead095172df9e0d82dcbee5ba6d54022b2055e4e359557f455f8e48e28dabbe96390d32df0377e044cbb5b447956120faa4622bbc86dd68920f732dff40b83a87a731dffb72a831fe5bd7c006a99be047401238df4f76d136cb22b7a82ea8c99eab345f190ccd52378afce96da6116b844c3bb78736f3294d7924d0e044c82dd76331467dbfa46be070d11375a37ba4bb01217135d91e710ed486e2ec97a5fe489272413d5d91e0ba0cd6414ebd14f7b4d5a78803bd93dc42db12f896b61a8b12767fe5a3793d0e667dd498b7204f705d32cf50601121a74aef912ef712e840d9d4867c0b5ef6c9225689f4675309da18406c4a021718e48d33b136e3dc898bbef8d7e4b59142f7ad62d51736df3df7aeb63b587637ffcea3cd02b4d4f84ecddd464282074926b843b1f45cc6e90a32f171f585e8764dca6a85f3792a29b0c8fa6a80145ec64136b28a7731975fcd97f47c2dbc26331e8457b0d67c88d2cd044be72a87f8e3cc110ed27d9410225b8baa41026bda1a038a83a989b600b3f114702e15f37da5e00ac7e38e019b2acfa24fb48598f5ebafabbcf5ed9c589519a033add3e151d8ea054142157c078cb2d220470082eeb1a51c1df6e17ce9a62beb406ff3ec640262af72d610b422d1183fd27cc5259ac0f11926e5923b8bdb8b1211bc38490e2963d296df57218da40cec71891ef865aea8c21cc050a091a0dbfa2edcd9ca80b25d64caf3232eb4906ac0774551c39520de4ef9519791084db33bcceb1e5bd11b60be7e33b4031b395c725f028a836c19a39056ce48b553dd16c2aac6ae471f2b3c2835d5c2a843a7f06b46e8722234ec6d7343eb7554b42cf9dc34fddd909bc430915106a680e9dcd4e83491dc1de15e6301608d1b6011bbe0e1b4a783e17f520a4846495dd14b61e4fbb8d259c27a5b1e820a3b018d42535547498184711b9e2d9df784c5f435f47560e055e6a320c8aa20d07409cd9aa056518d5496299fac13dc970ad05f22fb11a0377c278b13573ba01897a70108eb0eef9303b332d53f2cd19a07f917df07704623332d6e121caa72a71dc243c933a2458ee3da4c45f79f62dee301af6da69890dfd654ed78248ea03fedebb9d4cf2b8d46e72af54cd22f44cccdea4eb147ce107e8c4b8e7cf2c2bbae0f62bb25f37a2646e58e95e262d2d5e6d0c2b0186db73f131700b05e381fb96bf70cb674dd33af541ecd37b377d41ad62902ac23f2249882605643d88b92e45e53cb8b89289aa23e8723d3570806b6c354e9e2591bfee263ba3d7c57bd1c74de49c2880afc3aef6648e6b898cb81d10c816ca8dd0feb49c3673dbab43a22855ede015ec6f308c1481"}) 20:42:24 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) (async) 20:42:24 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:24 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x103e02, 0x0) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000800)={0x2, 0x1, 0x18, 0x13, 0x6e, &(0x7f0000000400)="3786fb7cb646e49ed39ebedfe4f8a4190db3d344c942edfefd5db53e14d27489d301feeb652af03d6e43ef6305bb57135ffd8897b8e35233ebeb87a0e49ba682c6fcfe6f65a0bb9dc3e6887a4771c1d68595ef5613472e5dd275b64555517e1f968f56b518bc2d7d41120dac94db786a12ffbc2c5cb984b36be705bae66e296dc275e8f719e9282b5432821976f4eadcc9e0f5ec6b340afd3a675ea3bc33c03d295307ef4a8b90cdabbcab7e5f3bf43d20648a41f68e913ff498be755bb05c10fa7b8cae8e053357cdc1e18ce95037a31cd5cd9bd69b3ef7dc0c66043fe82665c151f6e459af3293f33994f1dfec04a54a1270b41ffff8fe9f15628e1c9e7b96a637e80e351c4361e0e3245119adeeed26a07fd13ff65de0ee413034eb73ee8153a560a9d6371fdf96acd5baa008453e4b9b5c700640d975e6c9fc74c4e77e47da35ee627f2bcd812a0be39bc0e92942fde62c17618873d5db62b23e4c0afdfcefb815bd1efcca3240512d85e9a6f38d2288445ce7a76c674a7a3198878c61f2165d2ea5f8565a2840e82067427e5c08f89c15217ed72469ecface7723439a99cb2ec3bbe9cc61d3b1368e6dd70ca1169d1ca70cc44ae9627b2055677fdae1a91b9dd5de987bde3f3f2caf2526337d0922980739e6ee9bcda50550652376a290ebdf014ac4ba62a2c2898274be0924085109d2e9038e0fb6d0707e49f161497b67e5a9d57b3eef265c41c4991cd4f6cfc5547c5e6e099132fc8ab3607b7fa4508f3a56ab8b550bd301c433459562c8077dbfcef4e0e843248dc49daaf915d81e2bf1749e8e7d487fa63fdf00ccd1fe2c91af8c40e4496ba99de56c0c10b83560c8f863e25d4527467399429737f1240aafc2fddf000cfbc88ff69041575d30c68e2073a986d8e5daaa39dd3654de9fc1f09ef5e6894b894614c8880502e9012305f70b7bc13975e74f747515e9e4191f2eba84d603172a3449677be3bf562c37a6f4d2c0c8f2c82a7589cde943f745f4a8d8c931971d2e492645e696934fa13f7f0a9021230f19ef00281fc7590e536c71e1cb6c7eceb79d09202c3fa77f464d5c58f91c75945cba737cefde84e59f6adff2269f640c7ee4bf1ab6204978e5f14b52030a64a2605ff4dd169cb1b222c1255cd52d47ca4de7e068c9732ebcc88a5974a427a4137b375d21b67c97febb22309ca6949e877ce79508cdfb9f4767a56479bec15c28aa4b8cc23786bafea65b0148c9a2d9ba261587a3cd2d0a267378b00f6bd31720eb917565b0304a9c9c7c62eb9179ea604dcca3a7aea21ed2267af7de00741157ccb451f76349ee2c2bfe0a310f6c03340e514a02b3c220e6e109d84478a2d3ce4a6a8676ed658ab2e44ebfea50b968345912a4a6225475a5ea5b51d77ec287f1456f3146ad2915ef589adc952b0ef9477905eacea0420af3a71e"}) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1002000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@dont_hash}, {@audit}, {@subj_user={'subj_user', 0x3d, '-:,'}}, {@uid_lt={'uid<', 0xee00}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000c40)={0x2, 0x1, 0xb, 0x16, 0x55, &(0x7f0000000840)="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"}) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01]) 20:42:24 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:24 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:24 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:24 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB='e;toup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:24 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=']) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:25 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB='e;toup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB='e;toup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x4300) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0, 0x0, r1}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 20:42:25 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x1, 0x1e, 0x1aa, &(0x7f00000001c0)="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"}) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080)=0x1, 0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030317d93cf30303030303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x4300) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0, 0x0, r1}) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x1, 0x1e, 0x1aa, &(0x7f00000001c0)="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"}) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080)=0x1, 0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030317d93cf30303030303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x1, 0x1e, 0x1aa, &(0x7f00000001c0)="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"}) (async) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080)=0x1, 0x4) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030317d93cf30303030303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x4300) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0, 0x0, r1}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_open_dev$dri(&(0x7f00000000c0), 0x4, 0x4300) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_FD(r0, 0xc01064c2, &(0x7f00000001c0)={0x0, 0x0, r1}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) (async) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x1, 0x1e, 0x1aa, &(0x7f00000001c0)="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"}) (async) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080)=0x1, 0x4) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030317d93cf30303030303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x2) write$sequencer(0xffffffffffffffff, &(0x7f0000000080)=[@t={0x4, 0x4, 0x6}, @e={0xff, 0xc, 0xd, 0x53, @SEQ_NOTEON=@note=0x2, 0x8, 0x3, 0x4b}, @v={0x93, 0x8, 0x80, 0x1f, @generic=0x40, 0x80, 0x7f}, @l={0x92, 0x3, 0xb0, 0x2, 0x7, 0x40, 0xf0ce}, @raw={0xc, 0x8, "f1b66f63aadf"}, @l={0x92, 0x1, 0xb0, 0xb, 0x9, 0x5b, 0xfff7}, @v={0x93, 0xd, 0x0, 0x14, @MIDI_NOTEON=@note=0x1, 0x40, 0x7ff}, @n={0x1, 0x3, @SEQ_NOTEON=@special, 0x4}, @t={0x0, 0x6, 0x57, 0x4, @generic=0x8}, @t={0x4, 0x1, 0xda, 0x2}], 0x4c) 20:42:25 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x2) write$sequencer(0xffffffffffffffff, &(0x7f0000000080)=[@t={0x4, 0x4, 0x6}, @e={0xff, 0xc, 0xd, 0x53, @SEQ_NOTEON=@note=0x2, 0x8, 0x3, 0x4b}, @v={0x93, 0x8, 0x80, 0x1f, @generic=0x40, 0x80, 0x7f}, @l={0x92, 0x3, 0xb0, 0x2, 0x7, 0x40, 0xf0ce}, @raw={0xc, 0x8, "f1b66f63aadf"}, @l={0x92, 0x1, 0xb0, 0xb, 0x9, 0x5b, 0xfff7}, @v={0x93, 0xd, 0x0, 0x14, @MIDI_NOTEON=@note=0x1, 0x40, 0x7ff}, @n={0x1, 0x3, @SEQ_NOTEON=@special, 0x4}, @t={0x0, 0x6, 0x57, 0x4, @generic=0x8}, @t={0x4, 0x1, 0xda, 0x2}], 0x4c) 20:42:25 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (rerun: 64) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x2) write$sequencer(0xffffffffffffffff, &(0x7f0000000080)=[@t={0x4, 0x4, 0x6}, @e={0xff, 0xc, 0xd, 0x53, @SEQ_NOTEON=@note=0x2, 0x8, 0x3, 0x4b}, @v={0x93, 0x8, 0x80, 0x1f, @generic=0x40, 0x80, 0x7f}, @l={0x92, 0x3, 0xb0, 0x2, 0x7, 0x40, 0xf0ce}, @raw={0xc, 0x8, "f1b66f63aadf"}, @l={0x92, 0x1, 0xb0, 0xb, 0x9, 0x5b, 0xfff7}, @v={0x93, 0xd, 0x0, 0x14, @MIDI_NOTEON=@note=0x1, 0x40, 0x7ff}, @n={0x1, 0x3, @SEQ_NOTEON=@special, 0x4}, @t={0x0, 0x6, 0x57, 0x4, @generic=0x8}, @t={0x4, 0x1, 0xda, 0x2}], 0x4c) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x2) (async) write$sequencer(0xffffffffffffffff, &(0x7f0000000080)=[@t={0x4, 0x4, 0x6}, @e={0xff, 0xc, 0xd, 0x53, @SEQ_NOTEON=@note=0x2, 0x8, 0x3, 0x4b}, @v={0x93, 0x8, 0x80, 0x1f, @generic=0x40, 0x80, 0x7f}, @l={0x92, 0x3, 0xb0, 0x2, 0x7, 0x40, 0xf0ce}, @raw={0xc, 0x8, "f1b66f63aadf"}, @l={0x92, 0x1, 0xb0, 0xb, 0x9, 0x5b, 0xfff7}, @v={0x93, 0xd, 0x0, 0x14, @MIDI_NOTEON=@note=0x1, 0x40, 0x7ff}, @n={0x1, 0x3, @SEQ_NOTEON=@special, 0x4}, @t={0x0, 0x6, 0x57, 0x4, @generic=0x8}, @t={0x4, 0x1, 0xda, 0x2}], 0x4c) (async) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC=r0]) 20:42:25 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_STATUS(r0, 0x8001af71, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x8000, 0x2) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC=r0]) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01]) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:25 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_STATUS(r0, 0x8001af71, &(0x7f0000000040)) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x8000, 0x2) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=']) 20:42:25 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC=r0]) 20:42:25 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_it=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xa0032, &(0x7f0000002280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f743d757365725f69642c6673757569643d33346339645032352d616365512d633130622d615531322d32350336356336382c7063723d30303030303030303030303030303030303035312c736d61636b0173666c6f6f723d2c7365636c6162656c2c726f6f74636f6e746578743d757365725f752c7065726d69745f646972656374696f2c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:42:25 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:25 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:25 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_STATUS(r0, 0x8001af71, &(0x7f0000000040)) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x8000, 0x2) 20:42:25 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}]}}) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC=r0]) 20:42:26 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_it=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xa0032, &(0x7f0000002280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f743d757365725f69642c6673757569643d33346339645032352d616365512d633130622d615531322d32350336356336382c7063723d30303030303030303030303030303030303035312c736d61636b0173666c6f6f723d2c7365636c6162656c2c726f6f74636f6e746578743d757365725f752c7065726d69745f646972656374696f2c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}]}}) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC=r0]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) 20:42:26 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_it=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xa0032, &(0x7f0000002280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f743d757365725f69642c6673757569643d33346339645032352d616365512d633130622d615531322d32350336356336382c7063723d30303030303030303030303030303030303035312c736d61636b0173666c6f6f723d2c7365636c6162656c2c726f6f74636f6e746578743d757365725f752c7065726d69745f646972656374696f2c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_it=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xa0032, &(0x7f0000002280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f743d757365725f69642c6673757569643d33346339645032352d616365512d633130622d615531322d32350336356336382c7063723d30303030303030303030303030303030303035312c736d61636b0173666c6f6f723d2c7365636c6162656c2c726f6f74636f6e746578743d757365725f752c7065726d69745f646972656374696f2c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = socket(0x2c, 0x3, 0x1) socket(0x28, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000002440), 0x2) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f0000002300)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x32}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, r2}}]}}) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC=r0]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 20:42:26 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={0x0, 0x3, 0xdd}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-neon\x00'}}, &(0x7f00000000c0)="7979a6", &(0x7f0000000240)=""/221) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000340)={0x4}, 0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = socket(0x2c, 0x3, 0x1) socket(0x28, 0x2, 0x0) (async) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000002440), 0x2) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f0000002300)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x32}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, r2}}]}}) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={0x0, 0x3, 0xdd}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-neon\x00'}}, &(0x7f00000000c0)="7979a6", &(0x7f0000000240)=""/221) (async) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000340)={0x4}, 0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=r0]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=']) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = socket(0x2c, 0x3, 0x1) socket(0x28, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000002440), 0x2) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f0000002300)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x32}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, r2}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) (async) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020}, 0x2020) (async) socket(0x2c, 0x3, 0x1) (async) socket(0x28, 0x2, 0x0) (async) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000002440), 0x2) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f0000002300)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x32}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, r2}}]}}) (async) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={0x0, 0x3, 0xdd}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-neon\x00'}}, &(0x7f00000000c0)="7979a6", &(0x7f0000000240)=""/221) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000340)={0x4}, 0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={0x0, 0x3, 0xdd}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-neon\x00'}}, &(0x7f00000000c0)="7979a6", &(0x7f0000000240)=""/221) (async) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000340)={0x4}, 0x4) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=r0]) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="ce70"]) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f757023d1bffbcb692f01563bf9a15f69643ddc257f846fab2f3a4b31c886462056bcaffa807ada8e57655290", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f757023d1bffbcb692f01563bf9a15f69643ddc257f846fab2f3a4b31c886462056bcaffa807ada8e57655290", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000002c0)={0x825, 0x2, 0x2, 0x10000, 0x4, "697c1a5c9cfb1b14aa0e4eda68c4520e723e93", 0x5, 0x9}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x804c6, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=r0]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f757023d1bffbcb692f01563bf9a15f69643ddc257f846fab2f3a4b31c886462056bcaffa807ada8e57655290", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=r0]) 20:42:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000002c0)={0x825, 0x2, 0x2, 0x10000, 0x4, "697c1a5c9cfb1b14aa0e4eda68c4520e723e93", 0x5, 0x9}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x804c6, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d20c2b17d4c61b2dadf45eb2a9348a6bcd1ffa37c06dbf89f83f47913832baa1dfa212b2c10d776d47f0ec146e552f5f72d8350de0f95f5790158ad8e56aaa44b2175a0fea98588f1f5f9199959779cf762ddacf366275b3f24656f3739e4b808cd1af38b75bd5e54f5c6c9474ee47ec51809a4693a1158029757e315eccf8d1aaecfeba03064bcccfe8789cb6a1c50b964d1a68f73f6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="df0f"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=r0]) 20:42:26 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000002c0)={0x825, 0x2, 0x2, 0x10000, 0x4, "697c1a5c9cfb1b14aa0e4eda68c4520e723e93", 0x5, 0x9}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x804c6, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000002c0)={0x825, 0x2, 0x2, 0x10000, 0x4, "697c1a5c9cfb1b14aa0e4eda68c4520e723e93", 0x5, 0x9}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x804c6, &(0x7f0000000200)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) (async) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=r0]) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d20c2b17d4c61b2dadf45eb2a9348a6bcd1ffa37c06dbf89f83f47913832baa1dfa212b2c10d776d47f0ec146e552f5f72d8350de0f95f5790158ad8e56aaa44b2175a0fea98588f1f5f9199959779cf762ddacf366275b3f24656f3739e4b808cd1af38b75bd5e54f5c6c9474ee47ec51809a4693a1158029757e315eccf8d1aaecfeba03064bcccfe8789cb6a1c50b964d1a68f73f6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="df0f"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:26 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=r0]) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYRES32=r0]) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000240)=0x1000000) ioctl$VHOST_VDPA_GET_GROUP_NUM(r1, 0x8004af81, &(0x7f0000000140)) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:26 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=r0]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643d20c2b17d4c61b2dadf45eb2a9348a6bcd1ffa37c06dbf89f83f47913832baa1dfa212b2c10d776d47f0ec146e552f5f72d8350de0f95f5790158ad8e56aaa44b2175a0fea98588f1f5f9199959779cf762ddacf366275b3f24656f3739e4b808cd1af38b75bd5e54f5c6c9474ee47ec51809a4693a1158029757e315eccf8d1aaecfeba03064bcccfe8789cb6a1c50b964d1a68f73f6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="df0f"]) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYRES32=r0]) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000240)=0x1000000) ioctl$VHOST_VDPA_GET_GROUP_NUM(r1, 0x8004af81, &(0x7f0000000140)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYRES32=r0]) (async) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000240)=0x1000000) (async) ioctl$VHOST_VDPA_GET_GROUP_NUM(r1, 0x8004af81, &(0x7f0000000140)) (async) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=r0]) 20:42:26 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) socket(0x1d, 0x3, 0x70abae31) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=r0]) 20:42:26 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYRES32=r0]) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000240)=0x1000000) ioctl$VHOST_VDPA_GET_GROUP_NUM(r1, 0x8004af81, &(0x7f0000000140)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYRES32=r0]) (async) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r1, 0x4008af7c, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000240)=0x1000000) (async) ioctl$VHOST_VDPA_GET_GROUP_NUM(r1, 0x8004af81, &(0x7f0000000140)) (async) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) socket(0x1d, 0x3, 0x70abae31) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:26 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:26 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:26 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) 20:42:26 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=r0]) 20:42:26 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) socket(0x1d, 0x3, 0x70abae31) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) socket(0x1d, 0x3, 0x70abae31) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 20:42:26 executing program 2: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=r0]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '@'}}, {@permit_directio}]}}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c78186f746d4e64653d303030303030303030303030393030300100000000000000643d", @ANYBLOB="54db65b4e6ab1acec1cc15eef518ab1bfac175cfbeeebcf76cc49261c6b54ce14c97fcae25491d5cc5c5e1c61f4479b1ba7f421a288a6704a1acc3b474412580a0df58d3ecc632d44e6fed0a87f2c1c24b6e2ca3b9a40b8e5a0e311696a40be95c2b4110c5ba9bc349be1987a4901a67592e5e194dd437d2d71277d4564b09b67356e5788b48517ba44e5d3c649c4799fd257ec58c83a782272b8c7c7f3caa1b", @ANYBLOB=',grou0_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c78186f746d4e64653d303030303030303030303030393030300100000000000000643d", @ANYBLOB="54db65b4e6ab1acec1cc15eef518ab1bfac175cfbeeebcf76cc49261c6b54ce14c97fcae25491d5cc5c5e1c61f4479b1ba7f421a288a6704a1acc3b474412580a0df58d3ecc632d44e6fed0a87f2c1c24b6e2ca3b9a40b8e5a0e311696a40be95c2b4110c5ba9bc349be1987a4901a67592e5e194dd437d2d71277d4564b09b67356e5788b48517ba44e5d3c649c4799fd257ec58c83a782272b8c7c7f3caa1b", @ANYBLOB=',grou0_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '@'}}, {@permit_directio}]}}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '@'}}, {@permit_directio}]}}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) (async) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c78186f746d4e64653d303030303030303030303030393030300100000000000000643d", @ANYBLOB="54db65b4e6ab1acec1cc15eef518ab1bfac175cfbeeebcf76cc49261c6b54ce14c97fcae25491d5cc5c5e1c61f4479b1ba7f421a288a6704a1acc3b474412580a0df58d3ecc632d44e6fed0a87f2c1c24b6e2ca3b9a40b8e5a0e311696a40be95c2b4110c5ba9bc349be1987a4901a67592e5e194dd437d2d71277d4564b09b67356e5788b48517ba44e5d3c649c4799fd257ec58c83a782272b8c7c7f3caa1b", @ANYBLOB=',grou0_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c78186f746d4e64653d303030303030303030303030393030300100000000000000643d", @ANYBLOB="54db65b4e6ab1acec1cc15eef518ab1bfac175cfbeeebcf76cc49261c6b54ce14c97fcae25491d5cc5c5e1c61f4479b1ba7f421a288a6704a1acc3b474412580a0df58d3ecc632d44e6fed0a87f2c1c24b6e2ca3b9a40b8e5a0e311696a40be95c2b4110c5ba9bc349be1987a4901a67592e5e194dd437d2d71277d4564b09b67356e5788b48517ba44e5d3c649c4799fd257ec58c83a782272b8c7c7f3caa1b", @ANYBLOB=',grou0_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=r0]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, '@'}}, {@permit_directio}]}}) (async) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c008a1d7bb94f244df13c5bfc74ae3846a8b2176c6a6477005d90baa301d442acc582b3e2c123e43d65a3867e130959093225bd336dd7bf05dd455bc0f5fef8f608983fcf835ebb71721678f06d0886f94329b3e324ee820000d4174fb8a63610ca1d2dbfe22e8751664b9a4a05eaae0ccc0c712bfca62c2f05522a85f660e900082d2554f7f28543f55b772662d9317802f0de4f256a04bfb3522b61abb270f84bb620e3d19f188db8100c904bc2d1bdd18517c0f1ac82c01f50251257290b8909aa34978e66c82b8be971d6558edfa69a9f6a2950c257865295fea54ce5bc73fccb17bc8ba33d0fc5"]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '--}!M[:*%'}}, {@dont_hash}]}}) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c008a1d7bb94f244df13c5bfc74ae3846a8b2176c6a6477005d90baa301d442acc582b3e2c123e43d65a3867e130959093225bd336dd7bf05dd455bc0f5fef8f608983fcf835ebb71721678f06d0886f94329b3e324ee820000d4174fb8a63610ca1d2dbfe22e8751664b9a4a05eaae0ccc0c712bfca62c2f05522a85f660e900082d2554f7f28543f55b772662d9317802f0de4f256a04bfb3522b61abb270f84bb620e3d19f188db8100c904bc2d1bdd18517c0f1ac82c01f50251257290b8909aa34978e66c82b8be971d6558edfa69a9f6a2950c257865295fea54ce5bc73fccb17bc8ba33d0fc5"]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '--}!M[:*%'}}, {@dont_hash}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '--}!M[:*%'}}, {@dont_hash}]}}) (async) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c008a1d7bb94f244df13c5bfc74ae3846a8b2176c6a6477005d90baa301d442acc582b3e2c123e43d65a3867e130959093225bd336dd7bf05dd455bc0f5fef8f608983fcf835ebb71721678f06d0886f94329b3e324ee820000d4174fb8a63610ca1d2dbfe22e8751664b9a4a05eaae0ccc0c712bfca62c2f05522a85f660e900082d2554f7f28543f55b772662d9317802f0de4f256a04bfb3522b61abb270f84bb620e3d19f188db8100c904bc2d1bdd18517c0f1ac82c01f50251257290b8909aa34978e66c82b8be971d6558edfa69a9f6a2950c257865295fea54ce5bc73fccb17bc8ba33d0fc5"]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c008a1d7bb94f244df13c5bfc74ae3846a8b2176c6a6477005d90baa301d442acc582b3e2c123e43d65a3867e130959093225bd336dd7bf05dd455bc0f5fef8f608983fcf835ebb71721678f06d0886f94329b3e324ee820000d4174fb8a63610ca1d2dbfe22e8751664b9a4a05eaae0ccc0c712bfca62c2f05522a85f660e900082d2554f7f28543f55b772662d9317802f0de4f256a04bfb3522b61abb270f84bb620e3d19f188db8100c904bc2d1bdd18517c0f1ac82c01f50251257290b8909aa34978e66c82b8be971d6558edfa69a9f6a2950c257865295fea54ce5bc73fccb17bc8ba33d0fc5"]) (async) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '--}!M[:*%'}}, {@dont_hash}]}}) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[], [{@dont_hash}, {@uid_gt={'uid>', 0xee01}}, {@permit_directio}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}}) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:27 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[], [{@dont_hash}, {@uid_gt={'uid>', 0xee01}}, {@permit_directio}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}}) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[], [{@dont_hash}, {@uid_gt={'uid>', 0xee01}}, {@permit_directio}, {@audit}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit}, {@dont_hash}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}}) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) (async) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESDEC]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={&(0x7f00000001c0)="4fb3a19ffd46c1aa3feffde13e2ef8d8c66baa5a2dc77139033c596f74a5e6e9b29902730ae5ea4f8a589d4993eb9e8f2003a926facaf446de11f5fa96f0ad8c83a87b84a621a7d1816c31d611cf3b0ea88edabed99f627b15bc6235fe8dd70d3f00f4ecc022070081aec155b1e1ffefdafc67146228837fe4fe9b71047fd8bdc3a17b314e873fc9da557d651166eaa44b7e7e7e74a1", &(0x7f0000000280)=""/137, &(0x7f0000000340)="199f8e8c350fcf41305fbcec54a81111a0b614f5a9925e60ed1dc17512740e04c9a379429e0275886af27db238ded1cf3d034bf4e06f2ad4d1f1ece5186e7da9d272c7a02165948daf804001e02027abac97f5f4a9337ed389e554e5ef5ac534ed576701a1dda62754ff012b21ca0e254ffcd6f20254b225112e6712e745bda1cfcc9011f4c615bfe33dc587227ce292075f6b769bbf311b870c088e40448dc7668fe2b6e7a6f0eda4d1dbec73d254b1124c9966ce1ca54fc8adfa4f582d65ccd864e22c18277a94384cda98a9eff4a5e2", &(0x7f0000000440)="4d73d19ed37ff65af81086f7e4255ea3b7d87f826fafd2b7fc68673ff32c113e85db8e9bb39e75756c441c299fd0d8673c96ea135cb4a904aa0a0d659e9f1fe89ef52947589ffc88926f2172a3e1b03f8cc4eb17b3aafb7c82cc62c1808f90b6fb56fa6002cd9a9fa8a338c3fe33ea8306793bf8bd81b301cac01672ed80c4b6d9", 0xcfe9, r0}, 0x38) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x800, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2cd65198d91fac9f033d3009003030303030303030303030303030e7b695fe55ea3034303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1c, 0xfffeffff, 0x3, 0x3, 0x420, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, &(0x7f0000000200)={0x0, 0x42f}) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r0, r1}, 0xc) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESDEC]) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC]) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={&(0x7f00000001c0)="4fb3a19ffd46c1aa3feffde13e2ef8d8c66baa5a2dc77139033c596f74a5e6e9b29902730ae5ea4f8a589d4993eb9e8f2003a926facaf446de11f5fa96f0ad8c83a87b84a621a7d1816c31d611cf3b0ea88edabed99f627b15bc6235fe8dd70d3f00f4ecc022070081aec155b1e1ffefdafc67146228837fe4fe9b71047fd8bdc3a17b314e873fc9da557d651166eaa44b7e7e7e74a1", &(0x7f0000000280)=""/137, &(0x7f0000000340)="199f8e8c350fcf41305fbcec54a81111a0b614f5a9925e60ed1dc17512740e04c9a379429e0275886af27db238ded1cf3d034bf4e06f2ad4d1f1ece5186e7da9d272c7a02165948daf804001e02027abac97f5f4a9337ed389e554e5ef5ac534ed576701a1dda62754ff012b21ca0e254ffcd6f20254b225112e6712e745bda1cfcc9011f4c615bfe33dc587227ce292075f6b769bbf311b870c088e40448dc7668fe2b6e7a6f0eda4d1dbec73d254b1124c9966ce1ca54fc8adfa4f582d65ccd864e22c18277a94384cda98a9eff4a5e2", &(0x7f0000000440)="4d73d19ed37ff65af81086f7e4255ea3b7d87f826fafd2b7fc68673ff32c113e85db8e9bb39e75756c441c299fd0d8673c96ea135cb4a904aa0a0d659e9f1fe89ef52947589ffc88926f2172a3e1b03f8cc4eb17b3aafb7c82cc62c1808f90b6fb56fa6002cd9a9fa8a338c3fe33ea8306793bf8bd81b301cac01672ed80c4b6d9", 0xcfe9, r0}, 0x38) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:27 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYRESDEC]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x800, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2cd65198d91fac9f033d3009003030303030303030303030303030e7b695fe55ea3034303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1c, 0xfffeffff, 0x3, 0x3, 0x420, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, &(0x7f0000000200)={0x0, 0x42f}) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r0, r1}, 0xc) 20:42:27 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:27 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:27 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x800, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2cd65198d91fac9f033d3009003030303030303030303030303030e7b695fe55ea3034303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1c, 0xfffeffff, 0x3, 0x3, 0x420, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x48) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, &(0x7f0000000200)={0x0, 0x42f}) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r0, r1}, 0xc) 20:42:27 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000080)={&(0x7f00000001c0)="4fb3a19ffd46c1aa3feffde13e2ef8d8c66baa5a2dc77139033c596f74a5e6e9b29902730ae5ea4f8a589d4993eb9e8f2003a926facaf446de11f5fa96f0ad8c83a87b84a621a7d1816c31d611cf3b0ea88edabed99f627b15bc6235fe8dd70d3f00f4ecc022070081aec155b1e1ffefdafc67146228837fe4fe9b71047fd8bdc3a17b314e873fc9da557d651166eaa44b7e7e7e74a1", &(0x7f0000000280)=""/137, &(0x7f0000000340)="199f8e8c350fcf41305fbcec54a81111a0b614f5a9925e60ed1dc17512740e04c9a379429e0275886af27db238ded1cf3d034bf4e06f2ad4d1f1ece5186e7da9d272c7a02165948daf804001e02027abac97f5f4a9337ed389e554e5ef5ac534ed576701a1dda62754ff012b21ca0e254ffcd6f20254b225112e6712e745bda1cfcc9011f4c615bfe33dc587227ce292075f6b769bbf311b870c088e40448dc7668fe2b6e7a6f0eda4d1dbec73d254b1124c9966ce1ca54fc8adfa4f582d65ccd864e22c18277a94384cda98a9eff4a5e2", &(0x7f0000000440)="4d73d19ed37ff65af81086f7e4255ea3b7d87f826fafd2b7fc68673ff32c113e85db8e9bb39e75756c441c299fd0d8673c96ea135cb4a904aa0a0d659e9f1fe89ef52947589ffc88926f2172a3e1b03f8cc4eb17b3aafb7c82cc62c1808f90b6fb56fa6002cd9a9fa8a338c3fe33ea8306793bf8bd81b301cac01672ed80c4b6d9", 0xcfe9, r0}, 0x38) 20:42:27 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="47fcb0a0a06cd175e8245b49418339b7f157d450f1ad0c096f55e5", &(0x7f0000000040)=""/133, &(0x7f0000000100)="eb298e485c4dfa0ea0bf0cfda49227ae3bc5d44d8dad31fed510a7d41794d3108cf13e5482d862c4", &(0x7f0000000140)="54acc1d56875cac57c939523729e85573995b9d3503ecd2f1653e571becc1b143c72ac8f28241be0a2e9d640c7ff08d38c7cc8db88ab81e19af90d9268eafb360986a4604dc646fbc8936a327b6d87af34b749732ea744a750f22c1b4098677b385c06f9c9053c0b6839782a3dabcd6f89a4a92dac56cee0e65845954bbd749f95e935aec11c9e26fd7a9c74863d0d00a2b3c6658326b5f5de7681bdac9a17edc810991ad987fb3131c521e28657ceeb5aa4c70459", 0x4, r0}, 0x38) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="47fcb0a0a06cd175e8245b49418339b7f157d450f1ad0c096f55e5", &(0x7f0000000040)=""/133, &(0x7f0000000100)="eb298e485c4dfa0ea0bf0cfda49227ae3bc5d44d8dad31fed510a7d41794d3108cf13e5482d862c4", &(0x7f0000000140)="54acc1d56875cac57c939523729e85573995b9d3503ecd2f1653e571becc1b143c72ac8f28241be0a2e9d640c7ff08d38c7cc8db88ab81e19af90d9268eafb360986a4604dc646fbc8936a327b6d87af34b749732ea744a750f22c1b4098677b385c06f9c9053c0b6839782a3dabcd6f89a4a92dac56cee0e65845954bbd749f95e935aec11c9e26fd7a9c74863d0d00a2b3c6658326b5f5de7681bdac9a17edc810991ad987fb3131c521e28657ceeb5aa4c70459", 0x4, r0}, 0x38) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002280), 0x2, 0x0) mount$fuseblk(&(0x7f00000022c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x3168040, &(0x7f0000002300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x87120a0a389bca00}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_newroute={0x3c, 0x18, 0x689115ea1283b753, 0x70bd2a, 0x25dfdbfc, {0x80, 0x80, 0x10, 0x6, 0x0, 0x2, 0xfd, 0x7, 0x3c00}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_SRC={0x8, 0x2, @private=0xa010101}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_FLOW={0x8, 0xb, 0x97}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb0}, 0x2000000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000000)="47fcb0a0a06cd175e8245b49418339b7f157d450f1ad0c096f55e5", &(0x7f0000000040)=""/133, &(0x7f0000000100)="eb298e485c4dfa0ea0bf0cfda49227ae3bc5d44d8dad31fed510a7d41794d3108cf13e5482d862c4", &(0x7f0000000140)="54acc1d56875cac57c939523729e85573995b9d3503ecd2f1653e571becc1b143c72ac8f28241be0a2e9d640c7ff08d38c7cc8db88ab81e19af90d9268eafb360986a4604dc646fbc8936a327b6d87af34b749732ea744a750f22c1b4098677b385c06f9c9053c0b6839782a3dabcd6f89a4a92dac56cee0e65845954bbd749f95e935aec11c9e26fd7a9c74863d0d00a2b3c6658326b5f5de7681bdac9a17edc810991ad987fb3131c521e28657ceeb5aa4c70459", 0x4, r0}, 0x38) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 5: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002280), 0x2, 0x0) mount$fuseblk(&(0x7f00000022c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x3168040, &(0x7f0000002300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x87120a0a389bca00}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_newroute={0x3c, 0x18, 0x689115ea1283b753, 0x70bd2a, 0x25dfdbfc, {0x80, 0x80, 0x10, 0x6, 0x0, 0x2, 0xfd, 0x7, 0x3c00}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_SRC={0x8, 0x2, @private=0xa010101}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_FLOW={0x8, 0xb, 0x97}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb0}, 0x2000000) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ldst={0x3, 0x3, 0x0, 0x1, 0xa, 0xfffffffffffffffe, 0x4}, @jmp={0x5, 0x1, 0x4, 0x1, 0x3, 0x50, 0x8}, @ldst={0x1, 0x0, 0x3, 0x9, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffb}], &(0x7f0000000080)='GPL\x00', 0xe55, 0x54, &(0x7f00000000c0)=""/84, 0x1e00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0xd7, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, r2, 0x1]}, 0x80) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002280), 0x2, 0x0) mount$fuseblk(&(0x7f00000022c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x3168040, &(0x7f0000002300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x87120a0a389bca00}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_newroute={0x3c, 0x18, 0x689115ea1283b753, 0x70bd2a, 0x25dfdbfc, {0x80, 0x80, 0x10, 0x6, 0x0, 0x2, 0xfd, 0x7, 0x3c00}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_SRC={0x8, 0x2, @private=0xa010101}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_FLOW={0x8, 0xb, 0x97}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb0}, 0x2000000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000002280), 0x2, 0x0) (async) mount$fuseblk(&(0x7f00000022c0), &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x3168040, &(0x7f0000002300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x87120a0a389bca00}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_newroute={0x3c, 0x18, 0x689115ea1283b753, 0x70bd2a, 0x25dfdbfc, {0x80, 0x80, 0x10, 0x6, 0x0, 0x2, 0xfd, 0x7, 0x3c00}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_SRC={0x8, 0x2, @private=0xa010101}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_FLOW={0x8, 0xb, 0x97}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb0}, 0x2000000) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) (async) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ldst={0x3, 0x3, 0x0, 0x1, 0xa, 0xfffffffffffffffe, 0x4}, @jmp={0x5, 0x1, 0x4, 0x1, 0x3, 0x50, 0x8}, @ldst={0x1, 0x0, 0x3, 0x9, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffb}], &(0x7f0000000080)='GPL\x00', 0xe55, 0x54, &(0x7f00000000c0)=""/84, 0x1e00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0xd7, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, r2, 0x1]}, 0x80) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ldst={0x3, 0x3, 0x0, 0x1, 0xa, 0xfffffffffffffffe, 0x4}, @jmp={0x5, 0x1, 0x4, 0x1, 0x3, 0x50, 0x8}, @ldst={0x1, 0x0, 0x3, 0x9, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffb}], &(0x7f0000000080)='GPL\x00', 0xe55, 0x54, &(0x7f00000000c0)=""/84, 0x1e00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0xd7, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, r2, 0x1]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x9, &(0x7f0000000000)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ldst={0x3, 0x3, 0x0, 0x1, 0xa, 0xfffffffffffffffe, 0x4}, @jmp={0x5, 0x1, 0x4, 0x1, 0x3, 0x50, 0x8}, @ldst={0x1, 0x0, 0x3, 0x9, 0x7, 0xfffffffffffffff0, 0xfffffffffffffffb}], &(0x7f0000000080)='GPL\x00', 0xe55, 0x54, &(0x7f00000000c0)=""/84, 0x1e00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0xd7, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, r1, r2, 0x1]}, 0x80) (async) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:28 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:42:28 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:28 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:28 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 2: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=r0]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',root0000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x1b, 0xf, 0xe, &(0x7f00000001c0)="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"}) 20:42:28 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',root0000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x1b, 0xf, 0xe, &(0x7f00000001c0)="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"}) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75f365725f69643d", @ANYRESDEC=0xee00, @ANYRES64, @ANYRESDEC=0xee01, @ANYBLOB="2c006df24988372ab7bd9cf986a50a2901195e12ec67368167430970c25e7abd2d891f94b962cd2383b085a7e4278dc9bdb93cf03451d94ba6bd45f6fd4f1204223d1ac7307a3d48000000000000000000003b78b8b4822f93b4fd8970f8a24c76399d7322"]) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) syz_open_dev$media(&(0x7f0000000080), 0x44e, 0x301143) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',root0000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async, rerun: 32) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) (rerun: 32) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x1b, 0xf, 0xe, &(0x7f00000001c0)="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"}) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75f365725f69643d", @ANYRESDEC=0xee00, @ANYRES64, @ANYRESDEC=0xee01, @ANYBLOB="2c006df24988372ab7bd9cf986a50a2901195e12ec67368167430970c25e7abd2d891f94b962cd2383b085a7e4278dc9bdb93cf03451d94ba6bd45f6fd4f1204223d1ac7307a3d48000000000000000000003b78b8b4822f93b4fd8970f8a24c76399d7322"]) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) syz_open_dev$media(&(0x7f0000000080), 0x44e, 0x301143) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:28 executing program 0: mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75f365725f69643d", @ANYRESDEC=0xee00, @ANYRES64, @ANYRESDEC=0xee01, @ANYBLOB="2c006df24988372ab7bd9cf986a50a2901195e12ec67368167430970c25e7abd2d891f94b962cd2383b085a7e4278dc9bdb93cf03451d94ba6bd45f6fd4f1204223d1ac7307a3d48000000000000000000003b78b8b4822f93b4fd8970f8a24c76399d7322"]) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) syz_open_dev$media(&(0x7f0000000080), 0x44e, 0x301143) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f00000001c0)={0x0, 0xc0, ""/192}) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303034303030302c757365725f8b643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:28 executing program 4: getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC=r0]) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:28 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000001c0)=0x8, &(0x7f0000000200)=0x2) write$sequencer(0xffffffffffffffff, &(0x7f0000000080)=[@t={0x4, 0x4, 0x6}, @e={0xff, 0xc, 0xd, 0x53, @SEQ_NOTEON=@note=0x2, 0x8, 0x3, 0x4b}, @v={0x93, 0x8, 0x80, 0x1f, @generic=0x40, 0x80, 0x7f}, @l={0x92, 0x3, 0xb0, 0x2, 0x7, 0x40, 0xf0ce}, @raw={0xc, 0x8, "f1b66f63aadf"}, @l={0x92, 0x1, 0xb0, 0xb, 0x9, 0x5b, 0xfff7}, @v={0x93, 0xd, 0x0, 0x14, @MIDI_NOTEON=@note=0x1, 0x40, 0x7ff}, @n={0x1, 0x3, @SEQ_NOTEON=@special, 0x4}, @t={0x0, 0x6, 0x57, 0x4, @generic=0x8}, @t={0x4, 0x1, 0xda, 0x2}], 0x4c) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC]) 20:42:28 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303034303030302c757365725f8b643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async, rerun: 64) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) 20:42:28 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async, rerun: 64) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f00000001c0)={0x0, 0xc0, ""/192}) (rerun: 64) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f00000001c0)={0x0, 0xc0, ""/192}) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:28 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:28 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB='e;toup_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:28 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:28 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:28 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000003c0)=0x7, &(0x7f0000000400)=0x1) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0}, 0xfeaf) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x103401, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x7, 0xfff9, 0x5733, 0x4, 0x4}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000003780)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="3c00004000ee938e9218524346c8b38a5d2382beaeb061c9f39b000000000000", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r5, 0x402c542b, 0x0) r6 = socket$inet(0x2, 0x800, 0x5) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000340)={0x3}, 0x4) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303034303030302c757365725f8b643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f00000001c0)={0x0, 0xc0, ""/192}) 20:42:29 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000002380)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'group_id'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x01\x04\x00\x00\x00\x1a\xf7\x96'}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 20:42:29 executing program 1: getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r1) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=']) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2020000, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x406000, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x100c054, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf0}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@default_permissions}]}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) 20:42:29 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) read$FUSE(r0, &(0x7f0000000680)={0x2020}, 0x2020) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x4000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x6}}, {@blksize}, {@allow_other}], [{@fsmagic}, {@fsname}, {@uid_lt={'uid<', 0xee00}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x65, 0x36, 0x39, 0x38, 0x33, 0x0, 0x62], 0x2d, [0x33, 0x64, 0x34, 0x32], 0x2d, [0x31, 0x0, 0x33, 0x61], 0x2d, [0x62, 0x33, 0x37, 0x62], 0x2d, [0x6, 0x32, 0x34, 0x35, 0x65, 0x37, 0x36, 0x34]}}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', 0xee01}}]}}) r1 = socket(0x3, 0x0, 0xfffffffe) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x272d, 0x4) setsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000200)="25d97a064edf7f7ab8bc29cba1b8dc5b6863a5cc2434adc8121029a80bf0bcd758231117634cc058cd164fe29d9c22e5ce2f4c1eb5104efdabe3fa3b35843ed30a5a1cfbacef85302a0bf49128a32f810eeea71c484e496c2e63247f9bd0a56948e62f53a04800badb679ab2b9463fafdb0902cbe5aa94cd89b54bf39dbe6562d929ae2da7b6837a39d807598d", 0x8d) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r2, 0x8004af79, &(0x7f0000000080)) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2020000, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x406000, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x100c054, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf0}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@default_permissions}]}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2020000, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x406000, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x100c054, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf0}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@default_permissions}]}}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) (async) 20:42:29 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r1) 20:42:29 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) 20:42:29 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:29 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2020000, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x406000, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x100c054, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf0}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@default_permissions}]}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r1) 20:42:29 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:29 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) (async) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00'}) (async) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:29 executing program 3: r0 = geteuid() setuid(r0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) ioctl$SNDCTL_TMR_TEMPO(r3, 0xc0045405, &(0x7f0000000400)=0x7c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000440), &(0x7f0000000480)=0x1) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x108000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2ccc6f6f746d6f64653d303030303030302c757365725f69643d00"/42, @ANYRESDEC=0xee01, @ANYBLOB=',grod=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,blksize=0x0000000000000200,max_read=0x00000000000000eb,blksize=0x0000000000001900,rootcontext=system_u,euid>', @ANYRESDEC, @ANYBLOB=',permit_directio,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c646f6e745f6d6561737572652c646f6e745f6d6561737572652c6673757569643d34373886336136382d656633322d396265002d34354a642d6f363035333764622c7065726d69745f646972656374696f2c6673636f6e746578743d73797374656d5f752c00"]) socket$nl_route(0x10, 0x3, 0x0) geteuid() 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd']) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) (async) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bf26, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x805) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00'}) (async) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008000) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f00000004c0), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_CCA_OPT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd']) 20:42:29 executing program 3: r0 = geteuid() setuid(r0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) ioctl$SNDCTL_TMR_TEMPO(r3, 0xc0045405, &(0x7f0000000400)=0x7c) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async, rerun: 32) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000440), &(0x7f0000000480)=0x1) (rerun: 32) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x108000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2ccc6f6f746d6f64653d303030303030302c757365725f69643d00"/42, @ANYRESDEC=0xee01, @ANYBLOB=',grod=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,blksize=0x0000000000000200,max_read=0x00000000000000eb,blksize=0x0000000000001900,rootcontext=system_u,euid>', @ANYRESDEC, @ANYBLOB=',permit_directio,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c646f6e745f6d6561737572652c646f6e745f6d6561737572652c6673757569643d34373886336136382d656633322d396265002d34354a642d6f363035333764622c7065726d69745f646972656374696f2c6673636f6e746578743d73797374656d5f752c00"]) socket$nl_route(0x10, 0x3, 0x0) geteuid() 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd']) 20:42:29 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xf2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:29 executing program 3: r0 = geteuid() setuid(r0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) ioctl$SNDCTL_TMR_TEMPO(r3, 0xc0045405, &(0x7f0000000400)=0x7c) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000440), &(0x7f0000000480)=0x1) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x108000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2ccc6f6f746d6f64653d303030303030302c757365725f69643d00"/42, @ANYRESDEC=0xee01, @ANYBLOB=',grod=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,blksize=0x0000000000000200,max_read=0x00000000000000eb,blksize=0x0000000000001900,rootcontext=system_u,euid>', @ANYRESDEC, @ANYBLOB=',permit_directio,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c646f6e745f6d6561737572652c646f6e745f6d6561737572652c6673757569643d34373886336136382d656633322d396265002d34354a642d6f363035333764622c7065726d69745f646972656374696f2c6673636f6e746578743d73797374656d5f752c00"]) (async) socket$nl_route(0x10, 0x3, 0x0) (async) geteuid() 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:29 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xf2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xf2) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') socket(0x2b, 0xa, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xf2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xf2) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@default_permissions}, {@blksize}]}}) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x71, 0x2) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000080)={0x0, 0x5}) 20:42:29 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000080)={0x0, 0x5}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000080)={0x0, 0x5}) (async) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@default_permissions}, {@blksize}]}}) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x71, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@default_permissions}, {@blksize}]}}) (async) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x71, 0x2) (async) 20:42:29 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000080)={0x0, 0x5}) 20:42:29 executing program 5: mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@default_permissions}, {@blksize}]}}) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x71, 0x2) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:29 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x5723) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200001, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xf8, 0x401, 0x8001, 0xfffe, 0x14, "6ed1efeaa3d7f484"}) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="6ff9f49feacda497cbdb254318062ad3d42c8888d6abd15eecf5"]) 20:42:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:29 executing program 5: mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 20:42:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x5723) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200001, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xf8, 0x401, 0x8001, 0xfffe, 0x14, "6ed1efeaa3d7f484"}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x5723) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200001, 0x0) (async) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xf8, 0x401, 0x8001, 0xfffe, 0x14, "6ed1efeaa3d7f484"}) (async) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="6ff9f49feacda497cbdb254318062ad3d42c8888d6abd15eecf5"]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="6ff9f49feacda497cbdb254318062ad3d42c8888d6abd15eecf5"]) (async) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x5723) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200001, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xf8, 0x401, 0x8001, 0xfffe, 0x14, "6ed1efeaa3d7f484"}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x5723) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200001, 0x0) (async) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xf8, 0x401, 0x8001, 0xfffe, 0x14, "6ed1efeaa3d7f484"}) (async) 20:42:30 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="6ff9f49feacda497cbdb254318062ad3d42c8888d6abd15eecf5"]) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x6c) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x6c) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x6c) (async) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000000, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c649b71f3390e28f0656661756c745f7065726d697373696f6e732c75266964", @ANYRESDEC=0xee00, @ANYBLOB=',obj_type=,hash,uid=', @ANYRESDEC=0x0, @ANYBLOB=',func=CREDS_CHECK,\x00']) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getresuid(&(0x7f0000000240), &(0x7f0000000380), &(0x7f00000003c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='cq_schedule\x00', r1}, 0x10) 20:42:30 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000540)='ns/time_for_children\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x6c) 20:42:30 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3731e0b88790d23f000000b95434d28a9e959f7b5d178a7c91fb034e74f04903756c43d9549fab8579d1fd055799e4fa922550a5731dbc5b53e1d15ccd1365ddcfdcb2d63346a748684fee132087cf8c33d418290fb222ec81f746f17e57760f2ed2f1ea81a19a654fa162676097f229bd6520beca42bd2e74c962b1f7897c06704ed4c3800766d368cfde3eba0ee049b4af000000000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000ffdbdf256a00000008000300", @ANYRES32=r6, @ANYBLOB="0c00990007000000700000000a00060008021100000000000500d2000d0000000500d200050000000a00060008021100000100003452ccf784d4e1a4c9e6ac3e9b0957494dd583c3ed7c88b58796b78f54dc73b0557d31fb26a4c0396303cfb6fd5c6aeefa2fc0632a5f59c3b8f13159a9a1c3db6320e04f7a4e62c57c8bf3e05a0c13e55b259f581813a1f3f2a8690a98739fd5482ef323ed9a5869c832731092b487fd9925983ac8b191f8c7d2f948d6e80e9f7e3e82c57b77710c921726397ad7d7d3c79f49dd2c629213244da3e46e89ee13d1"], 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x22000000) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000000, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c649b71f3390e28f0656661756c745f7065726d697373696f6e732c75266964", @ANYRESDEC=0xee00, @ANYBLOB=',obj_type=,hash,uid=', @ANYRESDEC=0x0, @ANYBLOB=',func=CREDS_CHECK,\x00']) (async) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getresuid(&(0x7f0000000240), &(0x7f0000000380), &(0x7f00000003c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='cq_schedule\x00', r1}, 0x10) 20:42:30 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000']) 20:42:30 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d40303030f9ffffff3030303030303030303034303030302c757365725f69643d2bace8db7dccc11ecfa9b73a00977eb8c6dd8fd67fdacc8dca", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000001200,blksize=0x0000000000001400,max_read=0x00000000ffffffff,max_read=0x0000000000000004,default_permissions,defcontext=system_u,euid=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000']) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d40303030f9ffffff3030303030303030303034303030302c757365725f69643d2bace8db7dccc11ecfa9b73a00977eb8c6dd8fd67fdacc8dca", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000001200,blksize=0x0000000000001400,max_read=0x00000000ffffffff,max_read=0x0000000000000004,default_permissions,defcontext=system_u,euid=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x4000000, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c649b71f3390e28f0656661756c745f7065726d697373696f6e732c75266964", @ANYRESDEC=0xee00, @ANYBLOB=',obj_type=,hash,uid=', @ANYRESDEC=0x0, @ANYBLOB=',func=CREDS_CHECK,\x00']) (async) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getresuid(&(0x7f0000000240), &(0x7f0000000380), &(0x7f00000003c0)) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000540)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='cq_schedule\x00', r1}, 0x10) 20:42:30 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d40303030f9ffffff3030303030303030303034303030302c757365725f69643d2bace8db7dccc11ecfa9b73a00977eb8c6dd8fd67fdacc8dca", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000001200,blksize=0x0000000000001400,max_read=0x00000000ffffffff,max_read=0x0000000000000004,default_permissions,defcontext=system_u,euid=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000004000']) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x840, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}, {@default_permissions}, {@default_permissions}], [{@audit}, {@obj_user}, {@euid_lt={'euid<', 0xee01}}, {@uid_gt={'uid>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd'}}, {@subj_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsfloor}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 20:42:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x840, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}, {@default_permissions}, {@default_permissions}], [{@audit}, {@obj_user}, {@euid_lt={'euid<', 0xee01}}, {@uid_gt={'uid>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd'}}, {@subj_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsfloor}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getgroups(0x2, &(0x7f0000000340)=[0xee00, 0xee00]) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@appraise}, {@obj_role={'obj_role', 0x3d, '&+]^$\xa8/-]\\@$.\xd5-#[,'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x200001, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r3, 0x58, &(0x7f0000000540)}, 0x10) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use']) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getgroups(0x2, &(0x7f0000000340)=[0xee00, 0xee00]) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@appraise}, {@obj_role={'obj_role', 0x3d, '&+]^$\xa8/-]\\@$.\xd5-#[,'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x200001, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r3, 0x58, &(0x7f0000000540)}, 0x10) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) (async) getgroups(0x2, &(0x7f0000000340)=[0xee00, 0xee00]) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@appraise}, {@obj_role={'obj_role', 0x3d, '&+]^$\xa8/-]\\@$.\xd5-#[,'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x200001, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r3, 0x58, &(0x7f0000000540)}, 0x10) (async) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x840, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}, {@default_permissions}, {@default_permissions}], [{@audit}, {@obj_user}, {@euid_lt={'euid<', 0xee01}}, {@uid_gt={'uid>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd'}}, {@subj_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfsfloor}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use']) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) (async) getgroups(0x2, &(0x7f0000000340)=[0xee00, 0xee00]) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@appraise}, {@obj_role={'obj_role', 0x3d, '&+]^$\xa8/-]\\@$.\xd5-#[,'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x1}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500), 0x200001, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r3, 0x58, &(0x7f0000000540)}, 0x10) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}]}}) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x7ff, 0x8, 0x2, 0xd4, 0x4, "b96336caa432ad986712e37177e0d068072ada", 0x6989, 0xeae}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) 20:42:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,use']) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}]}}) (async) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x7ff, 0x8, 0x2, 0xd4, 0x4, "b96336caa432ad986712e37177e0d068072ada", 0x6989, 0xeae}) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000000)) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) 20:42:30 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', 'group_id'}, 0xe) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x3, 0x2}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i']) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', 'group_id'}, 0xe) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x3, 0x2}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', 'group_id'}, 0xe) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x3, 0x2}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}]}}) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x7ff, 0x8, 0x2, 0xd4, 0x4, "b96336caa432ad986712e37177e0d068072ada", 0x6989, 0xeae}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async, rerun: 32) clock_gettime(0x4, &(0x7f0000000000)) (rerun: 32) ioctl$TCSETS2(r0, 0x402c542b, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f00000000c0)) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000080)={'stack ', 'group_id'}, 0xe) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000000c0)={0x3, 0x2}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i']) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 2: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i']) 20:42:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x0) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="43e1d32e175e06103d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:30 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:30 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="43e1d32e175e06103d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:30 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id']) 20:42:30 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:30 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x0) (async) 20:42:30 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="43e1d32e175e06103d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async, rerun: 64) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) (rerun: 64) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x0) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id']) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id']) 20:42:31 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:31 executing program 5: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x4c340, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000c80)={0x2, 0x0, 0x1b, 0xa, 0x2f, &(0x7f0000000880)="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"}) ioctl$TCSETS2(r4, 0x402c542b, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x4, 0x1500, 0xffffffffffffffff, 0x9d7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0xc}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x9, 0xa2, 0xd5, 0x184, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1e, 0xde4, 0xfffffff9, 0x9, 0x4, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xfc26, 0x4, 0x6, 0x2, 0x1, 0xeff1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6}, 0x48) pipe2$watch_queue(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x2, 0x1, 0x5, 0x6, 0x1}, @ldst={0x0, 0x3, 0x3, 0x0, 0x1, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x8, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x7ff, 0x2}, 0x10, 0x7d3b, r2, 0x0, &(0x7f0000000680)=[0x1, r3, 0x1, r4, r6, r7, 0x1, r8, r9, r10]}, 0x80) r11 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r12 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31]}, &(0x7f0000000080)={0x0, "f40f347c16171784ed57c3e3b68fd83e29728674a64c571fc3bc387f3b0f789e617f69e5d1b9950a4d7b544b2233cf42bdf5fda716894d6e4bc46f14d33ca8ab"}, 0x48, r11) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, r12) keyctl$dh_compute(0x17, &(0x7f0000000080)={r12}, &(0x7f00000001c0)=""/175, 0xaf, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64650400000030303030303230303030303030303030303030302c757365727669648000e58f693117ef379d345c7bccfed8ae66d8cf1aefa9b3bba5897874300234f948084174643a9b1b88d50e6cb90ab5614116a38754e0727d53a3933d887664d0dc76fcecaad449f2f6abe9087e61f275c88e84dd3fb216981b6c1d3034489fc60bf349a7e7ff2787677efcb017ee9c3bdc99a56eab155de3c0c554f9b20e769ff1e774cd0d501679e937843a7a7ff544c1d63bbdc24ce62f29c719af3177d32a781ba400508eb98c20480ff266c055fca2b16ae71129c9ad5cfbe5476e34229f701742def643", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB]) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_i']) 20:42:31 executing program 0: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:31 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x4c340, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000c80)={0x2, 0x0, 0x1b, 0xa, 0x2f, &(0x7f0000000880)="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"}) ioctl$TCSETS2(r4, 0x402c542b, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x4, 0x1500, 0xffffffffffffffff, 0x9d7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0xc}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x9, 0xa2, 0xd5, 0x184, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1e, 0xde4, 0xfffffff9, 0x9, 0x4, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xfc26, 0x4, 0x6, 0x2, 0x1, 0xeff1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6}, 0x48) pipe2$watch_queue(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x2, 0x1, 0x5, 0x6, 0x1}, @ldst={0x0, 0x3, 0x3, 0x0, 0x1, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x8, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x7ff, 0x2}, 0x10, 0x7d3b, r2, 0x0, &(0x7f0000000680)=[0x1, r3, 0x1, r4, r6, r7, 0x1, r8, r9, r10]}, 0x80) r11 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r12 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31]}, &(0x7f0000000080)={0x0, "f40f347c16171784ed57c3e3b68fd83e29728674a64c571fc3bc387f3b0f789e617f69e5d1b9950a4d7b544b2233cf42bdf5fda716894d6e4bc46f14d33ca8ab"}, 0x48, r11) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, r12) keyctl$dh_compute(0x17, &(0x7f0000000080)={r12}, &(0x7f00000001c0)=""/175, 0xaf, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64650400000030303030303230303030303030303030303030302c757365727669648000e58f693117ef379d345c7bccfed8ae66d8cf1aefa9b3bba5897874300234f948084174643a9b1b88d50e6cb90ab5614116a38754e0727d53a3933d887664d0dc76fcecaad449f2f6abe9087e61f275c88e84dd3fb216981b6c1d3034489fc60bf349a7e7ff2787677efcb017ee9c3bdc99a56eab155de3c0c554f9b20e769ff1e774cd0d501679e937843a7a7ff544c1d63bbdc24ce62f29c719af3177d32a781ba400508eb98c20480ff266c055fca2b16ae71129c9ad5cfbe5476e34229f701742def643", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x4c340, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) pipe2$watch_queue(&(0x7f0000000400), 0x80) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000c80)={0x2, 0x0, 0x1b, 0xa, 0x2f, &(0x7f0000000880)="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"}) (async) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x4, 0x1500, 0xffffffffffffffff, 0x9d7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0xc}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x9, 0xa2, 0xd5, 0x184, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1e, 0xde4, 0xfffffff9, 0x9, 0x4, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xfc26, 0x4, 0x6, 0x2, 0x1, 0xeff1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6}, 0x48) (async) pipe2$watch_queue(&(0x7f0000000640), 0x80) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x2, 0x1, 0x5, 0x6, 0x1}, @ldst={0x0, 0x3, 0x3, 0x0, 0x1, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x8, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x7ff, 0x2}, 0x10, 0x7d3b, r2, 0x0, &(0x7f0000000680)=[0x1, r3, 0x1, r4, r6, r7, 0x1, r8, r9, r10]}, 0x80) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31]}, &(0x7f0000000080)={0x0, "f40f347c16171784ed57c3e3b68fd83e29728674a64c571fc3bc387f3b0f789e617f69e5d1b9950a4d7b544b2233cf42bdf5fda716894d6e4bc46f14d33ca8ab"}, 0x48, r11) (async) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, r12) (async) keyctl$dh_compute(0x17, &(0x7f0000000080)={r12}, &(0x7f00000001c0)=""/175, 0xaf, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64650400000030303030303230303030303030303030303030302c757365727669648000e58f693117ef379d345c7bccfed8ae66d8cf1aefa9b3bba5897874300234f948084174643a9b1b88d50e6cb90ab5614116a38754e0727d53a3933d887664d0dc76fcecaad449f2f6abe9087e61f275c88e84dd3fb216981b6c1d3034489fc60bf349a7e7ff2787677efcb017ee9c3bdc99a56eab155de3c0c554f9b20e769ff1e774cd0d501679e937843a7a7ff544c1d63bbdc24ce62f29c719af3177d32a781ba400508eb98c20480ff266c055fca2b16ae71129c9ad5cfbe5476e34229f701742def643", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB]) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'fuseblk\x00'}}, {@seclabel}]}}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_VQS_COUNT(r0, 0x8004af80, &(0x7f0000000080)) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'fuseblk\x00'}}, {@seclabel}]}}) (async) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_VQS_COUNT(r0, 0x8004af80, &(0x7f0000000080)) 20:42:31 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x4c340, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000c80)={0x2, 0x0, 0x1b, 0xa, 0x2f, &(0x7f0000000880)="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"}) (async) ioctl$TCSETS2(r4, 0x402c542b, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x4, 0x1500, 0xffffffffffffffff, 0x9d7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0xc}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x9, 0xa2, 0xd5, 0x184, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1e, 0xde4, 0xfffffff9, 0x9, 0x4, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xfc26, 0x4, 0x6, 0x2, 0x1, 0xeff1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6}, 0x48) pipe2$watch_queue(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0x4, &(0x7f00000002c0)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x2, 0x1, 0x5, 0x6, 0x1}, @ldst={0x0, 0x3, 0x3, 0x0, 0x1, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x8, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x7ff, 0x2}, 0x10, 0x7d3b, r2, 0x0, &(0x7f0000000680)=[0x1, r3, 0x1, r4, r6, r7, 0x1, r8, r9, r10]}, 0x80) r11 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r12 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31]}, &(0x7f0000000080)={0x0, "f40f347c16171784ed57c3e3b68fd83e29728674a64c571fc3bc387f3b0f789e617f69e5d1b9950a4d7b544b2233cf42bdf5fda716894d6e4bc46f14d33ca8ab"}, 0x48, r11) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, r12) (async) keyctl$dh_compute(0x17, &(0x7f0000000080)={r12}, &(0x7f00000001c0)=""/175, 0xaf, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64650400000030303030303230303030303030303030303030302c757365727669648000e58f693117ef379d345c7bccfed8ae66d8cf1aefa9b3bba5897874300234f948084174643a9b1b88d50e6cb90ab5614116a38754e0727d53a3933d887664d0dc76fcecaad449f2f6abe9087e61f275c88e84dd3fb216981b6c1d3034489fc60bf349a7e7ff2787677efcb017ee9c3bdc99a56eab155de3c0c554f9b20e769ff1e774cd0d501679e937843a7a7ff544c1d63bbdc24ce62f29c719af3177d32a781ba400508eb98c20480ff266c055fca2b16ae71129c9ad5cfbe5476e34229f701742def643", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x6c) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="0001"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000200)="de195ab4673d6fb8a137d4458dd477e076d0f66560e8b6dc68293d7fd571aee9b997dde3d26fd274bebc844636f6f4f539cfc5be69fc9c933c0e2b1327a15abfa0eb91761fdea78b52c622a36e4fea2bae6eee47e520317815dbe1f1525559c3edad17985d47aa9137cdf72f1dab57e47f", &(0x7f0000000080)=""/51, &(0x7f0000000280)="4624cfb6c69a190020cce6c1788affd0c6ce3f802bd92c65637ac26bf4de292ce08f01a449ba107ab7e64f329d754ef0d43baebb7db1b9a95d5ee221bd3e3e7478494a4f772fd6cf3dd0fdb79cac0d3d5dc225f3f2024afa8dc2025e270288c48a2b1da08346926e0309daa0cb61074094f1d9d56ce47182147cf1e83008ed81dc0c07ba6aa2b376b7862596876bdeae2935971668357c2c6576139bf7a0afd6241e66eafc8cceb0b73e1c0d37f57632b4742681b6d81d19f30dfff412819ca9ae", &(0x7f0000000380)="d63e5274457df07dda89554b0d5605ec7d82000b258770f7332d7eafca2b16bc33128eb0e07d58deffe35638a12a34a612bdaef9c9e5fadf2fae0b5af246fb2bdf5834fe1dfac905ed7c62a3545fe6d361a3138c2f3b2662d858c9df7c77d9a8a14769d6d3304e22ec6b24ff", 0x1d2, r1, 0x4}, 0x38) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'fuseblk\x00'}}, {@seclabel}]}}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_VQS_COUNT(r0, 0x8004af80, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'fuseblk\x00'}}, {@seclabel}]}}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_VDPA_GET_VQS_COUNT(r0, 0x8004af80, &(0x7f0000000080)) (async) 20:42:31 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(0x0, r0) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="0001"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000200)="de195ab4673d6fb8a137d4458dd477e076d0f66560e8b6dc68293d7fd571aee9b997dde3d26fd274bebc844636f6f4f539cfc5be69fc9c933c0e2b1327a15abfa0eb91761fdea78b52c622a36e4fea2bae6eee47e520317815dbe1f1525559c3edad17985d47aa9137cdf72f1dab57e47f", &(0x7f0000000080)=""/51, &(0x7f0000000280)="4624cfb6c69a190020cce6c1788affd0c6ce3f802bd92c65637ac26bf4de292ce08f01a449ba107ab7e64f329d754ef0d43baebb7db1b9a95d5ee221bd3e3e7478494a4f772fd6cf3dd0fdb79cac0d3d5dc225f3f2024afa8dc2025e270288c48a2b1da08346926e0309daa0cb61074094f1d9d56ce47182147cf1e83008ed81dc0c07ba6aa2b376b7862596876bdeae2935971668357c2c6576139bf7a0afd6241e66eafc8cceb0b73e1c0d37f57632b4742681b6d81d19f30dfff412819ca9ae", &(0x7f0000000380)="d63e5274457df07dda89554b0d5605ec7d82000b258770f7332d7eafca2b16bc33128eb0e07d58deffe35638a12a34a612bdaef9c9e5fadf2fae0b5af246fb2bdf5834fe1dfac905ed7c62a3545fe6d361a3138c2f3b2662d858c9df7c77d9a8a14769d6d3304e22ec6b24ff", 0x1d2, r1, 0x4}, 0x38) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="0001"]) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000200)="de195ab4673d6fb8a137d4458dd477e076d0f66560e8b6dc68293d7fd571aee9b997dde3d26fd274bebc844636f6f4f539cfc5be69fc9c933c0e2b1327a15abfa0eb91761fdea78b52c622a36e4fea2bae6eee47e520317815dbe1f1525559c3edad17985d47aa9137cdf72f1dab57e47f", &(0x7f0000000080)=""/51, &(0x7f0000000280)="4624cfb6c69a190020cce6c1788affd0c6ce3f802bd92c65637ac26bf4de292ce08f01a449ba107ab7e64f329d754ef0d43baebb7db1b9a95d5ee221bd3e3e7478494a4f772fd6cf3dd0fdb79cac0d3d5dc225f3f2024afa8dc2025e270288c48a2b1da08346926e0309daa0cb61074094f1d9d56ce47182147cf1e83008ed81dc0c07ba6aa2b376b7862596876bdeae2935971668357c2c6576139bf7a0afd6241e66eafc8cceb0b73e1c0d37f57632b4742681b6d81d19f30dfff412819ca9ae", &(0x7f0000000380)="d63e5274457df07dda89554b0d5605ec7d82000b258770f7332d7eafca2b16bc33128eb0e07d58deffe35638a12a34a612bdaef9c9e5fadf2fae0b5af246fb2bdf5834fe1dfac905ed7c62a3545fe6d361a3138c2f3b2662d858c9df7c77d9a8a14769d6d3304e22ec6b24ff", 0x1d2, r1, 0x4}, 0x38) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) (async) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 0: getresgid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x20890, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000780), 0xffffffffffffffff) 20:42:31 executing program 0: getresgid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x20890, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="0001"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000200)="de195ab4673d6fb8a137d4458dd477e076d0f66560e8b6dc68293d7fd571aee9b997dde3d26fd274bebc844636f6f4f539cfc5be69fc9c933c0e2b1327a15abfa0eb91761fdea78b52c622a36e4fea2bae6eee47e520317815dbe1f1525559c3edad17985d47aa9137cdf72f1dab57e47f", &(0x7f0000000080)=""/51, &(0x7f0000000280)="4624cfb6c69a190020cce6c1788affd0c6ce3f802bd92c65637ac26bf4de292ce08f01a449ba107ab7e64f329d754ef0d43baebb7db1b9a95d5ee221bd3e3e7478494a4f772fd6cf3dd0fdb79cac0d3d5dc225f3f2024afa8dc2025e270288c48a2b1da08346926e0309daa0cb61074094f1d9d56ce47182147cf1e83008ed81dc0c07ba6aa2b376b7862596876bdeae2935971668357c2c6576139bf7a0afd6241e66eafc8cceb0b73e1c0d37f57632b4742681b6d81d19f30dfff412819ca9ae", &(0x7f0000000380)="d63e5274457df07dda89554b0d5605ec7d82000b258770f7332d7eafca2b16bc33128eb0e07d58deffe35638a12a34a612bdaef9c9e5fadf2fae0b5af246fb2bdf5834fe1dfac905ed7c62a3545fe6d361a3138c2f3b2662d858c9df7c77d9a8a14769d6d3304e22ec6b24ff", 0x1d2, r1, 0x4}, 0x38) (async) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 0: getresgid(&(0x7f0000000000)=0x0, &(0x7f00000000c0), &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x20890, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:31 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4040, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303006000000000000003030303030303030303030302c757365725fd7c3187c69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',dont_measure,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x4020, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfea}}, {@default_permissions}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x37, 0x66, 0x34, 0x37, 0x66, 0x36, 0x66], 0x2d, [0xe, 0x65, 0x35, 0x32], 0x2d, [0x39, 0x64, 0x36, 0x39], 0x2d, [0x31, 0x35, 0x36, 0x38], 0x2d, [0x39, 0x64, 0x64, 0x38, 0x64, 0x66, 0x38, 0x31]}}}, {@subj_type={'subj_type', 0x3d, '\\{'}}]}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) clock_settime(0x2, &(0x7f0000000080)) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYBLOB]) 20:42:31 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) clock_settime(0x2, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) clock_settime(0x2, &(0x7f0000000080)) (async) 20:42:31 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4040, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303006000000000000003030303030303030303030302c757365725fd7c3187c69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',dont_measure,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x4020, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfea}}, {@default_permissions}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x37, 0x66, 0x34, 0x37, 0x66, 0x36, 0x66], 0x2d, [0xe, 0x65, 0x35, 0x32], 0x2d, [0x39, 0x64, 0x36, 0x39], 0x2d, [0x31, 0x35, 0x36, 0x38], 0x2d, [0x39, 0x64, 0x64, 0x38, 0x64, 0x66, 0x38, 0x31]}}}, {@subj_type={'subj_type', 0x3d, '\\{'}}]}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) 20:42:31 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd', @ANYBLOB]) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4040, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303006000000000000003030303030303030303030302c757365725fd7c3187c69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',dont_measure,euid<', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x4020, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfea}}, {@default_permissions}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x37, 0x66, 0x34, 0x37, 0x66, 0x36, 0x66], 0x2d, [0xe, 0x65, 0x35, 0x32], 0x2d, [0x39, 0x64, 0x36, 0x39], 0x2d, [0x31, 0x35, 0x36, 0x38], 0x2d, [0x39, 0x64, 0x64, 0x38, 0x64, 0x66, 0x38, 0x31]}}}, {@subj_type={'subj_type', 0x3d, '\\{'}}]}}) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) 20:42:31 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) clock_settime(0x2, &(0x7f0000000080)) 20:42:31 executing program 2: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 0: add_key$keyring(&(0x7f00000004c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='fscrypt:', 0x0) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize}, {@blksize={'blksize', 0x3d, 0x800}}]}}) socket$inet_tcp(0x2, 0x1, 0x0) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:31 executing program 0: add_key$keyring(&(0x7f00000004c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='fscrypt:', 0x0) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize}, {@blksize={'blksize', 0x3d, 0x800}}]}}) (async) socket$inet_tcp(0x2, 0x1, 0x0) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 0: add_key$keyring(&(0x7f00000004c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='fscrypt:', 0x0) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize}, {@blksize={'blksize', 0x3d, 0x800}}]}}) (async) socket$inet_tcp(0x2, 0x1, 0x0) 20:42:31 executing program 5: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r4, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r2, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, 0xffffffffffffffff, r4]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) syz_genetlink_get_family_id$smc(&(0x7f0000000780), r0) 20:42:31 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:31 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$VHOST_VDPA_GET_GROUP_NUM(r0, 0x8004af81, &(0x7f00000001c0)) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x4, 0x2) 20:42:32 executing program 0: ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000340)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x35, 0x37, 0x65, 0x33, 0x30, 0x62, 0x61], 0x2d, [0x30, 0x36, 0x37, 0x37], 0x2d, [0x35, 0x62, 0x39, 0x62], 0x2d, [0x38, 0x64, 0x38, 0x38], 0x2d, [0x37, 0x33, 0x37, 0x65, 0x31, 0x0, 0x39, 0x63]}}}]}}) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x25bc16acfa0e2e4e}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c000000180002002cbd7000fedbdf251d0102000800050002fcfb1f0800bff2050008fd000115000100020000c008030000d7e45f817110b96f0100"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$VHOST_VDPA_GET_GROUP_NUM(r0, 0x8004af81, &(0x7f00000001c0)) (async) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, 0x2) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async, rerun: 32) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 32) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x4, 0x2) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000340)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x35, 0x37, 0x65, 0x33, 0x30, 0x62, 0x61], 0x2d, [0x30, 0x36, 0x37, 0x37], 0x2d, [0x35, 0x62, 0x39, 0x62], 0x2d, [0x38, 0x64, 0x38, 0x38], 0x2d, [0x37, 0x33, 0x37, 0x65, 0x31, 0x0, 0x39, 0x63]}}}]}}) (async) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x25bc16acfa0e2e4e}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c000000180002002cbd7000fedbdf251d0102000800050002fcfb1f0800bff2050008fd000115000100020000c008030000d7e45f817110b96f0100"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$VHOST_VDPA_GET_GROUP_NUM(r0, 0x8004af81, &(0x7f00000001c0)) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x4, 0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) (async) ioctl$VHOST_VDPA_GET_GROUP_NUM(r0, 0x8004af81, &(0x7f00000001c0)) (async) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, 0x2) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x4, 0x2) (async) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000340)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x35, 0x37, 0x65, 0x33, 0x30, 0x62, 0x61], 0x2d, [0x30, 0x36, 0x37, 0x37], 0x2d, [0x35, 0x62, 0x39, 0x62], 0x2d, [0x38, 0x64, 0x38, 0x38], 0x2d, [0x37, 0x33, 0x37, 0x65, 0x31, 0x0, 0x39, 0x63]}}}]}}) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x25bc16acfa0e2e4e}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c000000180002002cbd7000fedbdf251d0102000800050002fcfb1f0800bff2050008fd000115000100020000c008030000d7e45f817110b96f0100"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000340)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4000, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x35, 0x37, 0x65, 0x33, 0x30, 0x62, 0x61], 0x2d, [0x30, 0x36, 0x37, 0x37], 0x2d, [0x35, 0x62, 0x39, 0x62], 0x2d, [0x38, 0x64, 0x38, 0x38], 0x2d, [0x37, 0x33, 0x37, 0x65, 0x31, 0x0, 0x39, 0x63]}}}]}}) (async) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x25bc16acfa0e2e4e}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c000000180002002cbd7000fedbdf251d0102000800050002fcfb1f0800bff2050008fd000115000100020000c008030000d7e45f817110b96f0100"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) (async) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfff}}]}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea"]) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfff}}]}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00]) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfff}}]}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfff}}]}}) (async) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYBLOB="759ffdee4abaeb6ea29f988fa4df18fa251b5e2ac2ceaf7ea82ec1d29e99fbecc59eff2bca8ec3954ca1b837d197bc723794e786fe3f957fcf43659ccf18212ca0b6148d1f7a5e253a99fde3fdf63c0af05fa3f89c7b7baadc9463ca2b67eac76bd4ef23bb6a0aee9a6e0682a6ee0c28c428792f", @ANYRESDEC=0xee01, @ANYRESDEC=0x0]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x1, 0x50, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_PROTOCOL={0x5, 0xc, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x41) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x218e4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYBLOB="759ffdee4abaeb6ea29f988fa4df18fa251b5e2ac2ceaf7ea82ec1d29e99fbecc59eff2bca8ec3954ca1b837d197bc723794e786fe3f957fcf43659ccf18212ca0b6148d1f7a5e253a99fde3fdf63c0af05fa3f89c7b7baadc9463ca2b67eac76bd4ef23bb6a0aee9a6e0682a6ee0c28c428792f", @ANYRESDEC=0xee01, @ANYRESDEC=0x0]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x1, 0x50, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_PROTOCOL={0x5, 0xc, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x41) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYBLOB="759ffdee4abaeb6ea29f988fa4df18fa251b5e2ac2ceaf7ea82ec1d29e99fbecc59eff2bca8ec3954ca1b837d197bc723794e786fe3f957fcf43659ccf18212ca0b6148d1f7a5e253a99fde3fdf63c0af05fa3f89c7b7baadc9463ca2b67eac76bd4ef23bb6a0aee9a6e0682a6ee0c28c428792f", @ANYRESDEC=0xee01, @ANYRESDEC=0x0]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x1, 0x50, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_PROTOCOL={0x5, 0xc, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x41) (async) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYBLOB="759ffdee4abaeb6ea29f988fa4df18fa251b5e2ac2ceaf7ea82ec1d29e99fbecc59eff2bca8ec3954ca1b837d197bc723794e786fe3f957fcf43659ccf18212ca0b6148d1f7a5e253a99fde3fdf63c0af05fa3f89c7b7baadc9463ca2b67eac76bd4ef23bb6a0aee9a6e0682a6ee0c28c428792f", @ANYRESDEC=0xee01, @ANYRESDEC=0x0]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x1, 0x50, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_PROTOCOL={0x5, 0xc, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x41) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRES16, @ANYRES16, @ANYBLOB="759ffdee4abaeb6ea29f988fa4df18fa251b5e2ac2ceaf7ea82ec1d29e99fbecc59eff2bca8ec3954ca1b837d197bc723794e786fe3f957fcf43659ccf18212ca0b6148d1f7a5e253a99fde3fdf63c0af05fa3f89c7b7baadc9463ca2b67eac76bd4ef23bb6a0aee9a6e0682a6ee0c28c428792f", @ANYRESDEC=0xee01, @ANYRESDEC=0x0]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_delneigh={0x38, 0x1d, 0x200, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x1, 0x50, 0x1}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}, @NDA_PROTOCOL={0x5, 0xc, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x41) (async) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, &(0x7f0000000900)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x218e4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 3: r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="2b91675124940ae151b13699ae3d537d815e64f1889b82986f6bef4386781f136711971fdfc9d831732a7c39f3ffba6d141c75779d968e147e6c3dcf79450fbbaf06b4641321a610d8c1a3d27887a772d91216fa7d5414e27ab9e05402608088bee3b2cc3d9012859af1bc54b2b33b02e6ae58700577fcc353b309a3ab7f53b551b0049aab90e9b62cd459f590bb197ed5eb88b04e0044c42830cc31fe7ac1e857ec8fee9cf691504447c84e16bd", 0xae, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r0, 0x67, 0xd3}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'digest_null-generic\x00'}}, &(0x7f0000000340)="9f33f068bd4c3da6118374e01522cfe6885a3b58a05999c884e551e8194ceea9a375c12afe4ac4883c4fa0d74e11580851e07aa91649272121a2cb2b22768ae18840da6f4879c977b6e4990337c634165cb1ab0d4348b94f0d21a907a537ea0c135f35da7ef7fe", &(0x7f00000003c0)=""/211) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',gr=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = add_key$user(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="88af1cd3800b91989c59d9ba74a2682451aacaedf6064bdccb2de79b9b7d354e47c6ec4fc34dd7ace20bd6f513f1ba5e04421eb27d06ad620668603032e36461cff76e7591fad49dced1443452113808bc4a2d18afe8cd9bc0f75419c755f63eeb7bc966a63cbb2cc71d7eb0fa60987ad5b6dfca294079f66cc5eb50591904e159bc1836ec0a81c736a27296b8778fec79e9cb5a97694a", 0x97, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000600)={r1, 0xb8, 0x4d}, &(0x7f0000000640)={'enc=', 'raw', ' hash=', {'hmac(sha256)\x00'}}, &(0x7f00000006c0)="cc9228a73d53488813258d7ccba0c12c029d5adb280e99f546e96ec1f051274a00700fe0a843337af73655de0cb590242f8a7ca8fe8bd5ee5121fa0fcc0fdf25fdba491c40f37ad38f40306521d483d67e472faf6ec91982515959dc6a7841d11c9d1739e9bd804694795f4da8d5fbdd6287cbf75e44215f9abd6fe6441c45663fb8f9085c9538c02f87179ff8fd85fe01a0542e416fc87dae7352cd70316238f525c0ca1800800ffbbc95d5f974a76990b541b2ea46bbd1", &(0x7f0000000780)=""/77) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000800)) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, &(0x7f0000000900)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="2b91675124940ae151b13699ae3d537d815e64f1889b82986f6bef4386781f136711971fdfc9d831732a7c39f3ffba6d141c75779d968e147e6c3dcf79450fbbaf06b4641321a610d8c1a3d27887a772d91216fa7d5414e27ab9e05402608088bee3b2cc3d9012859af1bc54b2b33b02e6ae58700577fcc353b309a3ab7f53b551b0049aab90e9b62cd459f590bb197ed5eb88b04e0044c42830cc31fe7ac1e857ec8fee9cf691504447c84e16bd", 0xae, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r0, 0x67, 0xd3}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'digest_null-generic\x00'}}, &(0x7f0000000340)="9f33f068bd4c3da6118374e01522cfe6885a3b58a05999c884e551e8194ceea9a375c12afe4ac4883c4fa0d74e11580851e07aa91649272121a2cb2b22768ae18840da6f4879c977b6e4990337c634165cb1ab0d4348b94f0d21a907a537ea0c135f35da7ef7fe", &(0x7f00000003c0)=""/211) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',gr=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) r1 = add_key$user(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="88af1cd3800b91989c59d9ba74a2682451aacaedf6064bdccb2de79b9b7d354e47c6ec4fc34dd7ace20bd6f513f1ba5e04421eb27d06ad620668603032e36461cff76e7591fad49dced1443452113808bc4a2d18afe8cd9bc0f75419c755f63eeb7bc966a63cbb2cc71d7eb0fa60987ad5b6dfca294079f66cc5eb50591904e159bc1836ec0a81c736a27296b8778fec79e9cb5a97694a", 0x97, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000600)={r1, 0xb8, 0x4d}, &(0x7f0000000640)={'enc=', 'raw', ' hash=', {'hmac(sha256)\x00'}}, &(0x7f00000006c0)="cc9228a73d53488813258d7ccba0c12c029d5adb280e99f546e96ec1f051274a00700fe0a843337af73655de0cb590242f8a7ca8fe8bd5ee5121fa0fcc0fdf25fdba491c40f37ad38f40306521d483d67e472faf6ec91982515959dc6a7841d11c9d1739e9bd804694795f4da8d5fbdd6287cbf75e44215f9abd6fe6441c45663fb8f9085c9538c02f87179ff8fd85fe01a0542e416fc87dae7352cd70316238f525c0ca1800800ffbbc95d5f974a76990b541b2ea46bbd1", &(0x7f0000000780)=""/77) (async) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) (async) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000800)) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:32 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, &(0x7f0000000900)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x218e4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 20:42:32 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:32 executing program 3: r0 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="2b91675124940ae151b13699ae3d537d815e64f1889b82986f6bef4386781f136711971fdfc9d831732a7c39f3ffba6d141c75779d968e147e6c3dcf79450fbbaf06b4641321a610d8c1a3d27887a772d91216fa7d5414e27ab9e05402608088bee3b2cc3d9012859af1bc54b2b33b02e6ae58700577fcc353b309a3ab7f53b551b0049aab90e9b62cd459f590bb197ed5eb88b04e0044c42830cc31fe7ac1e857ec8fee9cf691504447c84e16bd", 0xae, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r0, 0x67, 0xd3}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'digest_null-generic\x00'}}, &(0x7f0000000340)="9f33f068bd4c3da6118374e01522cfe6885a3b58a05999c884e551e8194ceea9a375c12afe4ac4883c4fa0d74e11580851e07aa91649272121a2cb2b22768ae18840da6f4879c977b6e4990337c634165cb1ab0d4348b94f0d21a907a537ea0c135f35da7ef7fe", &(0x7f00000003c0)=""/211) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',gr=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = add_key$user(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="88af1cd3800b91989c59d9ba74a2682451aacaedf6064bdccb2de79b9b7d354e47c6ec4fc34dd7ace20bd6f513f1ba5e04421eb27d06ad620668603032e36461cff76e7591fad49dced1443452113808bc4a2d18afe8cd9bc0f75419c755f63eeb7bc966a63cbb2cc71d7eb0fa60987ad5b6dfca294079f66cc5eb50591904e159bc1836ec0a81c736a27296b8778fec79e9cb5a97694a", 0x97, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000600)={r1, 0xb8, 0x4d}, &(0x7f0000000640)={'enc=', 'raw', ' hash=', {'hmac(sha256)\x00'}}, &(0x7f00000006c0)="cc9228a73d53488813258d7ccba0c12c029d5adb280e99f546e96ec1f051274a00700fe0a843337af73655de0cb590242f8a7ca8fe8bd5ee5121fa0fcc0fdf25fdba491c40f37ad38f40306521d483d67e472faf6ec91982515959dc6a7841d11c9d1739e9bd804694795f4da8d5fbdd6287cbf75e44215f9abd6fe6441c45663fb8f9085c9538c02f87179ff8fd85fe01a0542e416fc87dae7352cd70316238f525c0ca1800800ffbbc95d5f974a76990b541b2ea46bbd1", &(0x7f0000000780)=""/77) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000800)) add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="2b91675124940ae151b13699ae3d537d815e64f1889b82986f6bef4386781f136711971fdfc9d831732a7c39f3ffba6d141c75779d968e147e6c3dcf79450fbbaf06b4641321a610d8c1a3d27887a772d91216fa7d5414e27ab9e05402608088bee3b2cc3d9012859af1bc54b2b33b02e6ae58700577fcc353b309a3ab7f53b551b0049aab90e9b62cd459f590bb197ed5eb88b04e0044c42830cc31fe7ac1e857ec8fee9cf691504447c84e16bd", 0xae, 0xfffffffffffffffb) (async) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r0, 0x67, 0xd3}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'digest_null-generic\x00'}}, &(0x7f0000000340)="9f33f068bd4c3da6118374e01522cfe6885a3b58a05999c884e551e8194ceea9a375c12afe4ac4883c4fa0d74e11580851e07aa91649272121a2cb2b22768ae18840da6f4879c977b6e4990337c634165cb1ab0d4348b94f0d21a907a537ea0c135f35da7ef7fe", &(0x7f00000003c0)=""/211) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',gr=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) add_key$user(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="88af1cd3800b91989c59d9ba74a2682451aacaedf6064bdccb2de79b9b7d354e47c6ec4fc34dd7ace20bd6f513f1ba5e04421eb27d06ad620668603032e36461cff76e7591fad49dced1443452113808bc4a2d18afe8cd9bc0f75419c755f63eeb7bc966a63cbb2cc71d7eb0fa60987ad5b6dfca294079f66cc5eb50591904e159bc1836ec0a81c736a27296b8778fec79e9cb5a97694a", 0x97, r0) (async) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000600)={r1, 0xb8, 0x4d}, &(0x7f0000000640)={'enc=', 'raw', ' hash=', {'hmac(sha256)\x00'}}, &(0x7f00000006c0)="cc9228a73d53488813258d7ccba0c12c029d5adb280e99f546e96ec1f051274a00700fe0a843337af73655de0cb590242f8a7ca8fe8bd5ee5121fa0fcc0fdf25fdba491c40f37ad38f40306521d483d67e472faf6ec91982515959dc6a7841d11c9d1739e9bd804694795f4da8d5fbdd6287cbf75e44215f9abd6fe6441c45663fb8f9085c9538c02f87179ff8fd85fe01a0542e416fc87dae7352cd70316238f525c0ca1800800ffbbc95d5f974a76990b541b2ea46bbd1", &(0x7f0000000780)=""/77) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r2, 0x4008af7c, 0x0) (async) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000800)) (async) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6f46ab598f98a19d86c5038d206141a0bfe5d6e95ea2733259bd84c1fc941a60e86a3ca6e32a6b70e366e328ab67c35cb0cb27a570bef64fb09727f50532fd5d18d61e7d0787e0f7a5778d36adc1513ee18d39779bd1c935d2e5207886a35c71ab18dacdbfd77b894799ea4fe4cf45fa59ece7706b81a28df4960c5c503060c6e8c660001d00dab2806b52298fec669bac090bc6aabd4c3024206538292001b5b45a0f2074003ed53590127094351c69fd34d4acdb05c768d9cb147beece8f94737d87510a0549ccf9c9f2d9579004f1e432627ef2008a39646d896bd4ed8c2ee1f0d67c160d683474f9edd680981ac6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6f46ab598f98a19d86c5038d206141a0bfe5d6e95ea2733259bd84c1fc941a60e86a3ca6e32a6b70e366e328ab67c35cb0cb27a570bef64fb09727f50532fd5d18d61e7d0787e0f7a5778d36adc1513ee18d39779bd1c935d2e5207886a35c71ab18dacdbfd77b894799ea4fe4cf45fa59ece7706b81a28df4960c5c503060c6e8c660001d00dab2806b52298fec669bac090bc6aabd4c3024206538292001b5b45a0f2074003ed53590127094351c69fd34d4acdb05c768d9cb147beece8f94737d87510a0549ccf9c9f2d9579004f1e432627ef2008a39646d896bd4ed8c2ee1f0d67c160d683474f9edd680981ac6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6f46ab598f98a19d86c5038d206141a0bfe5d6e95ea2733259bd84c1fc941a60e86a3ca6e32a6b70e366e328ab67c35cb0cb27a570bef64fb09727f50532fd5d18d61e7d0787e0f7a5778d36adc1513ee18d39779bd1c935d2e5207886a35c71ab18dacdbfd77b894799ea4fe4cf45fa59ece7706b81a28df4960c5c503060c6e8c660001d00dab2806b52298fec669bac090bc6aabd4c3024206538292001b5b45a0f2074003ed53590127094351c69fd34d4acdb05c768d9cb147beece8f94737d87510a0549ccf9c9f2d9579004f1e432627ef2008a39646d896bd4ed8c2ee1f0d67c160d683474f9edd680981ac6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x100, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002500)={0x80000000, &(0x7f0000002440), &(0x7f0000002480)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000002540)={r2}) r3 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc005, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f74686501000000785f726561643d3078303030303030303030303030303030302c616c6c6f775f6f7468200000006c6b73697a653d3078303030303030303030303030306330302c64656661756c745f7065726d697373696f6e732c666f776e65723d", @ANYRESDEC=r3, @ANYBLOB=',smackfsdef=user_id,appraise_type=imasig,subj_role={,fsuuid=d41Qa488-P0ef-b2ad-e30d-06dc3409,appraise,uid>', @ANYRESDEC=r4, @ANYBLOB=',smackfshat=fd,subj_role=,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:32 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6f46ab598f98a19d86c5038d206141a0bfe5d6e95ea2733259bd84c1fc941a60e86a3ca6e32a6b70e366e328ab67c35cb0cb27a570bef64fb09727f50532fd5d18d61e7d0787e0f7a5778d36adc1513ee18d39779bd1c935d2e5207886a35c71ab18dacdbfd77b894799ea4fe4cf45fa59ece7706b81a28df4960c5c503060c6e8c660001d00dab2806b52298fec669bac090bc6aabd4c3024206538292001b5b45a0f2074003ed53590127094351c69fd34d4acdb05c768d9cb147beece8f94737d87510a0549ccf9c9f2d9579004f1e432627ef2008a39646d896bd4ed8c2ee1f0d67c160d683474f9edd680981ac6", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x100, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002500)={0x80000000, &(0x7f0000002440), &(0x7f0000002480)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000002540)={r2}) r3 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc005, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f74686501000000785f726561643d3078303030303030303030303030303030302c616c6c6f775f6f7468200000006c6b73697a653d3078303030303030303030303030306330302c64656661756c745f7065726d697373696f6e732c666f776e65723d", @ANYRESDEC=r3, @ANYBLOB=',smackfsdef=user_id,appraise_type=imasig,subj_role={,fsuuid=d41Qa488-P0ef-b2ad-e30d-06dc3409,appraise,uid>', @ANYRESDEC=r4, @ANYBLOB=',smackfshat=fd,subj_role=,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x100, 0x0) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002500)={0x80000000, &(0x7f0000002440), &(0x7f0000002480)}) (async) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000002540)={r2}) (async) geteuid() (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc005, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f74686501000000785f726561643d3078303030303030303030303030303030302c616c6c6f775f6f7468200000006c6b73697a653d3078303030303030303030303030306330302c64656661756c745f7065726d697373696f6e732c666f776e65723d", @ANYRESDEC=r3, @ANYBLOB=',smackfsdef=user_id,appraise_type=imasig,subj_role={,fsuuid=d41Qa488-P0ef-b2ad-e30d-06dc3409,appraise,uid>', @ANYRESDEC=r4, @ANYBLOB=',smackfshat=fd,subj_role=,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) (async) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:32 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000023c0)={0x2020}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2, &(0x7f00000022c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@subj_role={'subj_role', 0x3d, '$%!%\''}}, {@fsname={'fsname', 0x3d, 'fuseblk\x00'}}, {@obj_user={'obj_user', 0x3d, '.^)#+]!)\xc2.-%-/[\'}#'}}]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f0000002200)={0x0, 0x7a, ""/122}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 20:42:32 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000023c0)={0x2020}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2, &(0x7f00000022c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@subj_role={'subj_role', 0x3d, '$%!%\''}}, {@fsname={'fsname', 0x3d, 'fuseblk\x00'}}, {@obj_user={'obj_user', 0x3d, '.^)#+]!)\xc2.-%-/[\'}#'}}]}}) (async, rerun: 32) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async, rerun: 32) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f0000002200)={0x0, 0x7a, ""/122}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:32 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x100, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002500)={0x80000000, &(0x7f0000002440), &(0x7f0000002480)=[{{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000002540)={r2}) r3 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc005, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f74686501000000785f726561643d3078303030303030303030303030303030302c616c6c6f775f6f7468200000006c6b73697a653d3078303030303030303030303030306330302c64656661756c745f7065726d697373696f6e732c666f776e65723d", @ANYRESDEC=r3, @ANYBLOB=',smackfsdef=user_id,appraise_type=imasig,subj_role={,fsuuid=d41Qa488-P0ef-b2ad-e30d-06dc3409,appraise,uid>', @ANYRESDEC=r4, @ANYBLOB=',smackfshat=fd,subj_role=,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000002400), 0x100, 0x0) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000002500)={0x80000000, &(0x7f0000002440), &(0x7f0000002480)}) (async) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000002540)={r2}) (async) geteuid() (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc005, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f74686501000000785f726561643d3078303030303030303030303030303030302c616c6c6f775f6f7468200000006c6b73697a653d3078303030303030303030303030306330302c64656661756c745f7065726d697373696f6e732c666f776e65723d", @ANYRESDEC=r3, @ANYBLOB=',smackfsdef=user_id,appraise_type=imasig,subj_role={,fsuuid=d41Qa488-P0ef-b2ad-e30d-06dc3409,appraise,uid>', @ANYRESDEC=r4, @ANYBLOB=',smackfshat=fd,subj_role=,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) (async) 20:42:32 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:32 executing program 5: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:32 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000023c0)={0x2020}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x2, &(0x7f00000022c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@subj_role={'subj_role', 0x3d, '$%!%\''}}, {@fsname={'fsname', 0x3d, 'fuseblk\x00'}}, {@obj_user={'obj_user', 0x3d, '.^)#+]!)\xc2.-%-/[\'}#'}}]}}) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VHOST_VDPA_GET_CONFIG(0xffffffffffffffff, 0x8008af73, &(0x7f0000002200)={0x0, 0x7a, ""/122}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000200)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6c}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x1}}]}}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x20a000, 0x0) geteuid() ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f00000001c0)={"de62a500c78dfc98d77778dc8164ed06921b7dd7ff81dd5306bb587135bf", 0xd5b4, 0x8, 0x8000, [0xb7f, 0x9, 0xfffffffc, 0xff, 0x6, 0x7, 0xca5, 0x6, 0x8, 0x10001, 0x0, 0x3, 0x9bb5, 0x1, 0x80000001, 0x200, 0x3ff, 0x3]}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000200)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6c}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x1}}]}}) (async) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x20a000, 0x0) geteuid() (async) ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f00000001c0)={"de62a500c78dfc98d77778dc8164ed06921b7dd7ff81dd5306bb587135bf", 0xd5b4, 0x8, 0x8000, [0xb7f, 0x9, 0xfffffffc, 0xff, 0x6, 0x7, 0xca5, 0x6, 0x8, 0x10001, 0x0, 0x3, 0x9bb5, 0x1, 0x80000001, 0x200, 0x3ff, 0x3]}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000200)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6c}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x1}}]}}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,use']) 20:42:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x20a000, 0x0) geteuid() ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f00000001c0)={"de62a500c78dfc98d77778dc8164ed06921b7dd7ff81dd5306bb587135bf", 0xd5b4, 0x8, 0x8000, [0xb7f, 0x9, 0xfffffffc, 0xff, 0x6, 0x7, 0xca5, 0x6, 0x8, 0x10001, 0x0, 0x3, 0x9bb5, 0x1, 0x80000001, 0x200, 0x3ff, 0x3]}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x20a000, 0x0) (async) geteuid() (async) ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f00000001c0)={"de62a500c78dfc98d77778dc8164ed06921b7dd7ff81dd5306bb587135bf", 0xd5b4, 0x8, 0x8000, [0xb7f, 0x9, 0xfffffffc, 0xff, 0x6, 0x7, 0xca5, 0x6, 0x8, 0x10001, 0x0, 0x3, 0x9bb5, 0x1, 0x80000001, 0x200, 0x3ff, 0x3]}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) (async) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000200)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6c}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x1}}]}}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) (async) 20:42:33 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:33 executing program 4: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "8b44899efb9b521d892c0576479755c391f7e24749a50771056b8c4d81798f7a7885b501c35dce4b8bb61145055e87584df7c51210a4d4152adc67646cca6358", 0x40}, 0x48, r1) 20:42:33 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x40) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,u']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "8b44899efb9b521d892c0576479755c391f7e24749a50771056b8c4d81798f7a7885b501c35dce4b8bb61145055e87584df7c51210a4d4152adc67646cca6358", 0x40}, 0x48, r1) 20:42:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x40) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x40) (async) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (async) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:33 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x40) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:33 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "8b44899efb9b521d892c0576479755c391f7e24749a50771056b8c4d81798f7a7885b501c35dce4b8bb61145055e87584df7c51210a4d4152adc67646cca6358", 0x40}, 0x48, r1) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:33 executing program 1: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "8b44899efb9b521d892c0576479755c391f7e24749a50771056b8c4d81798f7a7885b501c35dce4b8bb61145055e87584df7c51210a4d4152adc67646cca6358", 0x40}, 0x48, r1) 20:42:33 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KDMKTONE(r0, 0x4b30, 0x40) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000380)={0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1}}) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x40) (async) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (async) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:33 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0xc29402, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, 0x0) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000300)=0x100) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@default_permissions}, {@default_permissions}]}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001300020025bd7000fedbdf2507000000", @ANYRES32=0x0, @ANYBLOB="fa60e8fb4400040008001f000500000024000e00160000000000a4f7f2d92f37d9c200000000000000000000a20005ff0000000026"], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x80) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f00000002c0)=0x7e) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:33 executing program 0: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x95, ""/149}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6585e07cbc30303030303030303030303030303034303030302c757365725f69643d00", @ANYRESDEC=0xee00, @ANYRESHEX, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:33 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0xc29402, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, 0x0) (async) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000300)=0x100) (async) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000080)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@default_permissions}, {@default_permissions}]}}) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001300020025bd7000fedbdf2507000000", @ANYRES32=0x0, @ANYBLOB="fa60e8fb4400040008001f000500000024000e00160000000000a4f7f2d92f37d9c200000000000000000000a20005ff0000000026"], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x80) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f00000002c0)=0x7e) 20:42:33 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 0: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x95, ""/149}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6585e07cbc30303030303030303030303030303034303030302c757365725f69643d00", @ANYRESDEC=0xee00, @ANYRESHEX, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x95, ""/149}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6585e07cbc30303030303030303030303030303034303030302c757365725f69643d00", @ANYRESDEC=0xee00, @ANYRESHEX, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0xc29402, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, 0x0) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000300)=0x100) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@default_permissions}, {@default_permissions}]}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001300020025bd7000fedbdf2507000000", @ANYRES32=0x0, @ANYBLOB="fa60e8fb4400040008001f000500000024000e00160000000000a4f7f2d92f37d9c200000000000000000000a20005ff0000000026"], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x80) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f00000002c0)=0x7e) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0), 0xc29402, 0x0) (async) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, 0x0) (async) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000300)=0x100) (async) ioctl$SNDCTL_SEQ_TESTMIDI(r0, 0x40045108, &(0x7f0000000080)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@default_permissions}, {@default_permissions}]}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000001300020025bd7000fedbdf2507000000", @ANYRES32=0x0, @ANYBLOB="fa60e8fb4400040008001f000500000024000e00160000000000a4f7f2d92f37d9c200000000000000000000a20005ff0000000026"], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x80) (async) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f00000002c0)=0x7e) (async) 20:42:33 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 0: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x95, ""/149}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6585e07cbc30303030303030303030303030303034303030302c757365725f69643d00", @ANYRESDEC=0xee00, @ANYRESHEX, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, 0x0) (async) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x95, ""/149}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6585e07cbc30303030303030303030303030303034303030302c757365725f69643d00", @ANYRESDEC=0xee00, @ANYRESHEX, @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) (async) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:33 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r3, 0x402c542b, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f00000006c0)={0x80000000, &(0x7f0000000600), &(0x7f0000000640)}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xd, 0x3, 0x7, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x9, 0xef, &(0x7f0000000240)=""/239, 0x40f00, 0xa, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x5}, 0x10, 0xe4e4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r2, 0xffffffffffffffff, r3]}, 0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="200026bd7000fddbdf25120000000c000600030000000000000005001300000000000800", @ANYRES32, @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x4c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7188a0bb6d28cdbfd1902f1371"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "7ac95397fa"}, @NL80211_ATTR_MAC={0x9, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc001) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000227bd7000fddbdf250d0000000c000600030000000000000008000c00020000000c00060000", @ANYRES32=0x0, @ANYBLOB='\b\x00\r\x00\x00\x00\x00\x00'], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r3) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r4) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f00000003c0)) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:33 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xee00, 0x0, 0xee00, 0x0]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:33 executing program 4: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:33 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:33 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="200026bd7000fddbdf25120000000c000600030000000000000005001300000000000800", @ANYRES32, @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x4c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7188a0bb6d28cdbfd1902f1371"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "7ac95397fa"}, @NL80211_ATTR_MAC={0x9, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc001) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000227bd7000fddbdf250d0000000c000600030000000000000008000c00020000000c00060000", @ANYRES32=0x0, @ANYBLOB='\b\x00\r\x00\x00\x00\x00\x00'], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r3) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r4) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f00000003c0)) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="200026bd7000fddbdf25120000000c000600030000000000000005001300000000000800", @ANYRES32, @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x4c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7188a0bb6d28cdbfd1902f1371"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "7ac95397fa"}, @NL80211_ATTR_MAC={0x9, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc001) (async) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000227bd7000fddbdf250d0000000c000600030000000000000008000c00020000000c00060000", @ANYRES32=0x0, @ANYBLOB='\b\x00\r\x00\x00\x00\x00\x00'], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r3) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r3) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r4) (async) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f00000003c0)) (async) 20:42:33 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xee00, 0x0, 0xee00, 0x0]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:33 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000580)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x6, 0x1, 0x501, 0xc08, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wlan0\x00'}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:33 executing program 1: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:33 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:33 executing program 0: getgroups(0x4, &(0x7f0000000080)=[0xee00, 0x0, 0xee00, 0x0]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}}) 20:42:33 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=']) 20:42:33 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:33 executing program 1: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:33 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) 20:42:33 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:42:34 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="200026bd7000fddbdf25120000000c000600030000000000000005001300000000000800", @ANYRES32, @ANYBLOB="0500130000000005001300000000000500130001000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x4c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "7188a0bb6d28cdbfd1902f1371"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "7ac95397fa"}, @NL80211_ATTR_MAC={0x9, 0x6, @device_b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc001) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000227bd7000fddbdf250d0000000c000600030000000000000008000c00020000000c00060000", @ANYRES32=0x0, @ANYBLOB='\b\x00\r\x00\x00\x00\x00\x00'], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), r3) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r3) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r4) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f00000003c0)) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB='\x00\x00']) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030304230873f225ea01afe3430303030", @ANYRESDEC=0xee00, @ANYBLOB="2c6772f2fd64056f7570", @ANYRESDEC=0xee01, @ANYBLOB="3aa5"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x10e01, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="b1ceb4a5d24d73ef5c81db452d1bd67fc0a9d9198a45bb2a31e3b499e943d9d4ac5cb409f088f7ff27177578d383b3b6e40f232a037694e8dea1707d3ca5000ff4528b0eab83a6b0e52aa66279490475"}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0xa4800, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f0000000280)="b8e988a8f94202c0ac1c688abb441493ceae67d63d29e5e2c699847dc97da9ce2db7651ce9f0f27bd311b0b5d1fc32be100fe5d8d63d7cf057ecba7649a4cafa861730b1dbd21c521e892b28187126134301361b5bbf7649b9419f3fe56dd9e22de9add35837d68551e5a56d3a71ec777848a00fba5093b815ec41d9b7f9c5404ae2dde6d4c748310fedd0b886a79022e80f7d3160ea9e"}, 0x20) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000380)={0x3, 0x3cd}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f00000003c0)="c825e079eea5d787ac8133c29877b326a32fa9ae37a1e9936637eabcc4b527199885d3d604bf5d5af6f3f82760cfa4da5920c0b7a808ef73e3c734", &(0x7f0000000400)=""/4096, &(0x7f0000001400)="279b3a57e3526f13cc13ea2f0b046c17b4640c9d7aabdee068e9a535a6d7f32b953e7e1369fbc1dd4688156c50ae3beba2bcbbcfa05987a489bf98b112b1fc6266b685220ff624ae9ea47a3adde387ae1409aaab785b30fa6adcd57b16d94247f408b9f324725ff6fadd7f2f3f45b47e2dff8f3503d9a9b3b8e1e116be7b05a3b2eeca217dfb8bc5789c7d3f175e57f36b62ae6911bde43682103b346364bc6822a091f074079a49d9e0c1a0652a597298a7e302e90e3e512c01ac3597b8380f0c828be64a5a62e4099cd1df282e0c755494a621567cb24feb226912494668cb767d1d9d9423c4d89352c13c855e013222ca8e0035a312f3e037d1", &(0x7f0000001500)="58e44aa9b7b7d02064ebb74be75f9087c3effe9d30223685c3ec4f7214f9235e8f7bc2370abc82a4514059", 0x4, r2}, 0x38) syz_open_dev$tty20(0xc, 0x4, 0x1) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,use']) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@max_read={'max_read', 0x3d, 0x8}}]}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000140)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@ipmr_delroute={0x44, 0x19, 0x11, 0x70bd2d, 0x25dfdbfe, {0x80, 0x65e18b141024e2f7, 0x10, 0x6, 0xff, 0x4, 0x36, 0x5, 0x2400}, [@RTA_TABLE={0x8, 0xf, 0x5b}, @RTA_OIF={0x8, 0x4, r0}, @RTA_PRIORITY={0x8, 0x6, 0x2}, @RTA_DPORT={0x6, 0x1d, 0x4e23}, @RTA_PRIORITY={0x8, 0x6, 0x2659}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x0) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) 20:42:34 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030304230873f225ea01afe3430303030", @ANYRESDEC=0xee00, @ANYBLOB="2c6772f2fd64056f7570", @ANYRESDEC=0xee01, @ANYBLOB="3aa5"]) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x10e01, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="b1ceb4a5d24d73ef5c81db452d1bd67fc0a9d9198a45bb2a31e3b499e943d9d4ac5cb409f088f7ff27177578d383b3b6e40f232a037694e8dea1707d3ca5000ff4528b0eab83a6b0e52aa66279490475"}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0xa4800, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f0000000280)="b8e988a8f94202c0ac1c688abb441493ceae67d63d29e5e2c699847dc97da9ce2db7651ce9f0f27bd311b0b5d1fc32be100fe5d8d63d7cf057ecba7649a4cafa861730b1dbd21c521e892b28187126134301361b5bbf7649b9419f3fe56dd9e22de9add35837d68551e5a56d3a71ec777848a00fba5093b815ec41d9b7f9c5404ae2dde6d4c748310fedd0b886a79022e80f7d3160ea9e"}, 0x20) (async) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000380)={0x3, 0x3cd}) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f00000003c0)="c825e079eea5d787ac8133c29877b326a32fa9ae37a1e9936637eabcc4b527199885d3d604bf5d5af6f3f82760cfa4da5920c0b7a808ef73e3c734", &(0x7f0000000400)=""/4096, &(0x7f0000001400)="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", &(0x7f0000001500)="58e44aa9b7b7d02064ebb74be75f9087c3effe9d30223685c3ec4f7214f9235e8f7bc2370abc82a4514059", 0x4, r2}, 0x38) (async) syz_open_dev$tty20(0xc, 0x4, 0x1) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@max_read={'max_read', 0x3d, 0x8}}]}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000140)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@ipmr_delroute={0x44, 0x19, 0x11, 0x70bd2d, 0x25dfdbfe, {0x80, 0x65e18b141024e2f7, 0x10, 0x6, 0xff, 0x4, 0x36, 0x5, 0x2400}, [@RTA_TABLE={0x8, 0xf, 0x5b}, @RTA_OIF={0x8, 0x4, r0}, @RTA_PRIORITY={0x8, 0x6, 0x2}, @RTA_DPORT={0x6, 0x1d, 0x4e23}, @RTA_PRIORITY={0x8, 0x6, 0x2659}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@max_read={'max_read', 0x3d, 0x8}}]}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000140)=0xc) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@ipmr_delroute={0x44, 0x19, 0x11, 0x70bd2d, 0x25dfdbfe, {0x80, 0x65e18b141024e2f7, 0x10, 0x6, 0xff, 0x4, 0x36, 0x5, 0x2400}, [@RTA_TABLE={0x8, 0xf, 0x5b}, @RTA_OIF={0x8, 0x4, r0}, @RTA_PRIORITY={0x8, 0x6, 0x2}, @RTA_DPORT={0x6, 0x1d, 0x4e23}, @RTA_PRIORITY={0x8, 0x6, 0x2659}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x0) (async) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea", @ANYRESDEC=0xee01]) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@max_read={'max_read', 0x3d, 0x8}}]}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000140)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@ipmr_delroute={0x44, 0x19, 0x11, 0x70bd2d, 0x25dfdbfe, {0x80, 0x65e18b141024e2f7, 0x10, 0x6, 0xff, 0x4, 0x36, 0x5, 0x2400}, [@RTA_TABLE={0x8, 0xf, 0x5b}, @RTA_OIF={0x8, 0x4, r0}, @RTA_PRIORITY={0x8, 0x6, 0x2}, @RTA_DPORT={0x6, 0x1d, 0x4e23}, @RTA_PRIORITY={0x8, 0x6, 0x2659}]}, 0x44}, 0x1, 0x0, 0x0, 0x84}, 0x0) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030304230873f225ea01afe3430303030", @ANYRESDEC=0xee00, @ANYBLOB="2c6772f2fd64056f7570", @ANYRESDEC=0xee01, @ANYBLOB="3aa5"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x10e01, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="b1ceb4a5d24d73ef5c81db452d1bd67fc0a9d9198a45bb2a31e3b499e943d9d4ac5cb409f088f7ff27177578d383b3b6e40f232a037694e8dea1707d3ca5000ff4528b0eab83a6b0e52aa66279490475"}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0xa4800, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f0000000280)="b8e988a8f94202c0ac1c688abb441493ceae67d63d29e5e2c699847dc97da9ce2db7651ce9f0f27bd311b0b5d1fc32be100fe5d8d63d7cf057ecba7649a4cafa861730b1dbd21c521e892b28187126134301361b5bbf7649b9419f3fe56dd9e22de9add35837d68551e5a56d3a71ec777848a00fba5093b815ec41d9b7f9c5404ae2dde6d4c748310fedd0b886a79022e80f7d3160ea9e"}, 0x20) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000380)={0x3, 0x3cd}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f00000003c0)="c825e079eea5d787ac8133c29877b326a32fa9ae37a1e9936637eabcc4b527199885d3d604bf5d5af6f3f82760cfa4da5920c0b7a808ef73e3c734", &(0x7f0000000400)=""/4096, &(0x7f0000001400)="279b3a57e3526f13cc13ea2f0b046c17b4640c9d7aabdee068e9a535a6d7f32b953e7e1369fbc1dd4688156c50ae3beba2bcbbcfa05987a489bf98b112b1fc6266b685220ff624ae9ea47a3adde387ae1409aaab785b30fa6adcd57b16d94247f408b9f324725ff6fadd7f2f3f45b47e2dff8f3503d9a9b3b8e1e116be7b05a3b2eeca217dfb8bc5789c7d3f175e57f36b62ae6911bde43682103b346364bc6822a091f074079a49d9e0c1a0652a597298a7e302e90e3e512c01ac3597b8380f0c828be64a5a62e4099cd1df282e0c755494a621567cb24feb226912494668cb767d1d9d9423c4d89352c13c855e013222ca8e0035a312f3e037d1", &(0x7f0000001500)="58e44aa9b7b7d02064ebb74be75f9087c3effe9d30223685c3ec4f7214f9235e8f7bc2370abc82a4514059", 0x4, r2}, 0x38) syz_open_dev$tty20(0xc, 0x4, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030304230873f225ea01afe3430303030", @ANYRESDEC=0xee00, @ANYBLOB="2c6772f2fd64056f7570", @ANYRESDEC=0xee01, @ANYBLOB="3aa5"]) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x10e01, 0x0) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000001c0)="b1ceb4a5d24d73ef5c81db452d1bd67fc0a9d9198a45bb2a31e3b499e943d9d4ac5cb409f088f7ff27177578d383b3b6e40f232a037694e8dea1707d3ca5000ff4528b0eab83a6b0e52aa66279490475"}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0xa4800, 0x0) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f0000000280)="b8e988a8f94202c0ac1c688abb441493ceae67d63d29e5e2c699847dc97da9ce2db7651ce9f0f27bd311b0b5d1fc32be100fe5d8d63d7cf057ecba7649a4cafa861730b1dbd21c521e892b28187126134301361b5bbf7649b9419f3fe56dd9e22de9add35837d68551e5a56d3a71ec777848a00fba5093b815ec41d9b7f9c5404ae2dde6d4c748310fedd0b886a79022e80f7d3160ea9e"}, 0x20) (async) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000380)={0x3, 0x3cd}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r2, 0x402c542b, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f00000003c0)="c825e079eea5d787ac8133c29877b326a32fa9ae37a1e9936637eabcc4b527199885d3d604bf5d5af6f3f82760cfa4da5920c0b7a808ef73e3c734", &(0x7f0000000400)=""/4096, &(0x7f0000001400)="279b3a57e3526f13cc13ea2f0b046c17b4640c9d7aabdee068e9a535a6d7f32b953e7e1369fbc1dd4688156c50ae3beba2bcbbcfa05987a489bf98b112b1fc6266b685220ff624ae9ea47a3adde387ae1409aaab785b30fa6adcd57b16d94247f408b9f324725ff6fadd7f2f3f45b47e2dff8f3503d9a9b3b8e1e116be7b05a3b2eeca217dfb8bc5789c7d3f175e57f36b62ae6911bde43682103b346364bc6822a091f074079a49d9e0c1a0652a597298a7e302e90e3e512c01ac3597b8380f0c828be64a5a62e4099cd1df282e0c755494a621567cb24feb226912494668cb767d1d9d9423c4d89352c13c855e013222ca8e0035a312f3e037d1", &(0x7f0000001500)="58e44aa9b7b7d02064ebb74be75f9087c3effe9d30223685c3ec4f7214f9235e8f7bc2370abc82a4514059", 0x4, r2}, 0x38) (async) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0), 0x1000, &(0x7f00000011c0)=ANY=[@ANYBLOB='ft=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',allow_other,default_permissions,max_read=0x0000000000000002,default_permissions,max_read=0x0000000000000005,func=KEXEC_INITRAMFS_CHECK,smackfsfloor=},\x00']) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0), 0x1000, &(0x7f00000011c0)=ANY=[@ANYBLOB='ft=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',allow_other,default_permissions,max_read=0x0000000000000002,default_permissions,max_read=0x0000000000000005,func=KEXEC_INITRAMFS_CHECK,smackfsfloor=},\x00']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, 0x0) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,u']) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) mount$fuseblk(&(0x7f0000000080), &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0), 0x1000, &(0x7f00000011c0)=ANY=[@ANYBLOB='ft=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',allow_other,default_permissions,max_read=0x0000000000000002,default_permissions,max_read=0x0000000000000005,func=KEXEC_INITRAMFS_CHECK,smackfsfloor=},\x00']) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) mount$fuseblk(&(0x7f0000000080), &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0), 0x1000, &(0x7f00000011c0)=ANY=[@ANYBLOB='ft=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',allow_other,default_permissions,max_read=0x0000000000000002,default_permissions,max_read=0x0000000000000005,func=KEXEC_INITRAMFS_CHECK,smackfsfloor=},\x00']) (async) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67726f75705f69643d0ef947dded7bf7577bd35afdecdaf476ec9c2df0af478ad84d7f0adf76972851d7ff95a610c1d56ebed47ebd287d39f47f1175fb71a6366f502a04e6c402118ad21448a5fdf2552596ade4f79438290df74fab147b0d5c0ca4ec704368de369a4e0fc2aaa0857708f93dd0dd830fab2623936b9d47a66ecc1ef77410323fa291e63da499118b6911f966a91d6e1003e98cbf58eccb7f631b57a5b8966982ea"]) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_delroute={0x3c, 0x19, 0x8, 0x70bd2d, 0x25dfdbff, {0x80, 0x20, 0x0, 0x9, 0xfc, 0x1, 0x0, 0x8, 0x400}, [@RTA_PREFSRC={0x8, 0x7, @local}, @RTA_SPORT={0x6, 0x1c, 0x4e21}, @RTA_NH_ID={0x8, 0x1e, 0x5}, @RTA_DST={0x8, 0x1, @remote}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10008871}, 0x4) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f0000000240)) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000100), 0x20, &(0x7f0000000300)=ANY=[]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x4000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@hash}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'syzkaller\x00'}}]}}) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000600)={0x3, 0x30}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x2, r1}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18270000", @ANYRESHEX, @ANYRES8=r4], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x1e, &(0x7f00000001c0)=""/30, 0x0, 0x4, '\x00', 0x0, 0x26, r0, 0x8, &(0x7f0000000200)={0x8806, 0x1}, 0x8, 0x10, &(0x7f0000000080)={0x100004, 0xf, 0x8, 0xe9f7f0be}, 0x10, 0xffffffffffffffff}, 0x80) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:34 executing program 4: mount$fuseblk(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00]) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000100), 0x20, &(0x7f0000000300)=ANY=[]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x4000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@hash}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'syzkaller\x00'}}]}}) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000600)={0x3, 0x30}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x2, r1}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18270000", @ANYRESHEX, @ANYRES8=r4], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x1e, &(0x7f00000001c0)=""/30, 0x0, 0x4, '\x00', 0x0, 0x26, r0, 0x8, &(0x7f0000000200)={0x8806, 0x1}, 0x8, 0x10, &(0x7f0000000080)={0x100004, 0xf, 0x8, 0xe9f7f0be}, 0x10, 0xffffffffffffffff}, 0x80) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000100), 0x20, &(0x7f0000000300)=ANY=[]) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000001740)={0x2020}, 0x2020) (async) mount$fuseblk(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x4000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@hash}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'syzkaller\x00'}}]}}) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000600)={0x3, 0x30}) (async) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x2, r1}) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18270000", @ANYRESHEX, @ANYRES8=r4], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x1e, &(0x7f00000001c0)=""/30, 0x0, 0x4, '\x00', 0x0, 0x26, r0, 0x8, &(0x7f0000000200)={0x8806, 0x1}, 0x8, 0x10, &(0x7f0000000080)={0x100004, 0xf, 0x8, 0xe9f7f0be}, 0x10, 0xffffffffffffffff}, 0x80) (async) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_delroute={0x3c, 0x19, 0x8, 0x70bd2d, 0x25dfdbff, {0x80, 0x20, 0x0, 0x9, 0xfc, 0x1, 0x0, 0x8, 0x400}, [@RTA_PREFSRC={0x8, 0x7, @local}, @RTA_SPORT={0x6, 0x1c, 0x4e21}, @RTA_NH_ID={0x8, 0x1e, 0x5}, @RTA_DST={0x8, 0x1, @remote}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10008871}, 0x4) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f0000000240)) 20:42:34 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x8008af73, &(0x7f00000001c0)={0x0, 0x1000, ""/4096}) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r0, 0x8004af79, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x2001, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0xa5dd91d78f06f70c, 0x0) ioctl$VHOST_VDPA_GET_VQS_COUNT(r2, 0x8004af80, &(0x7f0000003340)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000140)=r1) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000003240)=ANY=[@ANYBLOB="2ffb30731b8527c4f8c23df848142e95baf301c25622e83cc52503dad2e9a8e3378858b4431c6a2515b8c2d41d1dd5cc9314df4d01ba3666f261d987656d759a34dd7099012bdfd915179ef193e6ae8e81682b800969f3c4f8d4013fd8ae68d67d87db025f42982de335f0dbc34d325e6f5446", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000001200)={0x2020}, 0x2020) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=']) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipmr_delroute={0x3c, 0x19, 0x8, 0x70bd2d, 0x25dfdbff, {0x80, 0x20, 0x0, 0x9, 0xfc, 0x1, 0x0, 0x8, 0x400}, [@RTA_PREFSRC={0x8, 0x7, @local}, @RTA_SPORT={0x6, 0x1c, 0x4e21}, @RTA_NH_ID={0x8, 0x1e, 0x5}, @RTA_DST={0x8, 0x1, @remote}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10008871}, 0x4) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f0000000240)) 20:42:34 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f0000000100), 0x20, &(0x7f0000000300)=ANY=[]) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000001740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000180), &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x4000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', 0xee01}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@hash}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'syzkaller\x00'}}]}}) (async) ioctl$TCSETS2(r1, 0x402c542b, 0x0) (async) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000600)={0x3, 0x30}) (async) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x2, r1}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r4, 0x4008af7c, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18270000", @ANYRESHEX, @ANYRES8=r4], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x1e, &(0x7f00000001c0)=""/30, 0x0, 0x4, '\x00', 0x0, 0x26, r0, 0x8, &(0x7f0000000200)={0x8806, 0x1}, 0x8, 0x10, &(0x7f0000000080)={0x100004, 0xf, 0x8, 0xe9f7f0be}, 0x10, 0xffffffffffffffff}, 0x80) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="748066a6b646c289d8bd05d9f3ea51d65726722f3e0dd5f862ef9aefd73384a63b7fa1d9d4b4077d29063b60e337dfd8799504c347b7d7546aa79699ad32e47638da7e003af51e8181164e93b23f4d74b0e404f8377245e94034285ac310d75922f7cc9d4a8bd425a3c7ff2d3ec00e9dac5985106bde9713f65e115b4a0105e356b694a75a85b4003ab2356413982a8b2cacc0f1f7c5999b8a85705096ab393e509b9a488217f74e36079e", 0xab, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000280)=@chain={'key_or_keyring:', r0}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "da641b03fe8f70ac6389b80e25878614b73be22c5498321271219007b229a142dd19f2159bacbf34d6a13f9c0811990177d1cd3dd34aeef6de4de1988a4d6b8f", 0x20}, 0x48, r2) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), 0x0, &(0x7f0000000100), 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, 0x0, 0x328, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0xdc, 0x12}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "1fa5179427"}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008080}, 0x44914) r2 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000180)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$TCSETS2(r3, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0xffffffff, 0x200403, 0x803ff, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000040)={r4}) syz_open_dev$dri(&(0x7f00000000c0), 0x5, 0x500) syz_genetlink_get_family_id$smc(&(0x7f0000000140), r3) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r3, 0xc00464b4, &(0x7f0000000340)={r4}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r5, 0x402c542b, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r5, 0xc01064b3, &(0x7f0000000100)={r4}) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="748066a6b646c289d8bd05d9f3ea51d65726722f3e0dd5f862ef9aefd73384a63b7fa1d9d4b4077d29063b60e337dfd8799504c347b7d7546aa79699ad32e47638da7e003af51e8181164e93b23f4d74b0e404f8377245e94034285ac310d75922f7cc9d4a8bd425a3c7ff2d3ec00e9dac5985106bde9713f65e115b4a0105e356b694a75a85b4003ab2356413982a8b2cacc0f1f7c5999b8a85705096ab393e509b9a488217f74e36079e", 0xab, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000280)=@chain={'key_or_keyring:', r0}) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "da641b03fe8f70ac6389b80e25878614b73be22c5498321271219007b229a142dd19f2159bacbf34d6a13f9c0811990177d1cd3dd34aeef6de4de1988a4d6b8f", 0x20}, 0x48, r2) 20:42:34 executing program 0: keyctl$clear(0x7, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) clock_getres(0x3fbfdfbf98024fc6, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x1) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:34 executing program 0: keyctl$clear(0x7, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="748066a6b646c289d8bd05d9f3ea51d65726722f3e0dd5f862ef9aefd73384a63b7fa1d9d4b4077d29063b60e337dfd8799504c347b7d7546aa79699ad32e47638da7e003af51e8181164e93b23f4d74b0e404f8377245e94034285ac310d75922f7cc9d4a8bd425a3c7ff2d3ec00e9dac5985106bde9713f65e115b4a0105e356b694a75a85b4003ab2356413982a8b2cacc0f1f7c5999b8a85705096ab393e509b9a488217f74e36079e", 0xab, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000280)=@chain={'key_or_keyring:', r0}) (async) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r2, 0x0) (async) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000340)={0x0, "da641b03fe8f70ac6389b80e25878614b73be22c5498321271219007b229a142dd19f2159bacbf34d6a13f9c0811990177d1cd3dd34aeef6de4de1988a4d6b8f", 0x20}, 0x48, r2) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000440)={0x2, 0x3ff, 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1cc, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_IE={0x180, 0x2a, [@ext_channel_switch={0x3c, 0x4, {0x0, 0x9, 0xb1, 0xbe}}, @random_vendor={0xdd, 0xb6, "26296d07fd0c5da46e9b388420423dba7634af8d49d1a44e51262bceccbb0ccdabaf258c0ffef8b217bd97675acf4418a1d825d6651ba8ec04302431b58c0a6d26f0c97ab5da4f8684a5b5caa963e472261c225c4504373245841cb2f09b9ae5014ceafb13bb304601188f5254bbc5174a3bf58366eef5120a3a606b02ff879efa867a14922be7f146b27a34837187e4c98a365c1a9f8d132d8cd1b865e0be9c53107b783587a9a6ed959f8a9ed15840dea4417f638c"}, @tim={0x5, 0xbc, {0x6, 0xba, 0x2, "997ee930e8efe0a58bc1615d3ffddec4b48aabc923f880e1fd574c53e5c233179d12bac9b331a28659472f0d20c68aac475d9762193d1bf3e03f245197b5b8650b518e40eb6ae93be568f20ee31c7eb08595b5b1fa54a3c45c463b2d6f3bc4b5403f19979019d393b0850b75c0d4ac0b812e580a9790575cf993bba6d88ec5578323dd0bc8f163fa359a936b79443d778ca8b624c4d6475be7e7c0f66f8f59b0e81d5edc12ca226ad356f12e9907969f3555a7f741074a276a"}}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x497}, @NL80211_ATTR_MAC={0xa}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x8000}, 0x44800) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:34 executing program 0: keyctl$clear(0x7, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) keyctl$clear(0x7, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', 0x0, 0x4015, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 2: getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000140)) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x10010, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303036303030302c757365725f69643d597ae22106625c8ddaef1684426a620169e0b74a7ea7b55e6f0a0601bac227050000002c70927cd4ed8a00"/100, @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(0xffffffffffffffff, 0x8004af79, &(0x7f0000000180)) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000080)={0x3, 0x8000}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 20:42:34 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB]) 20:42:34 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:34 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000000c0)={0x1, 0x2d0}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="00000002000000000000", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:34 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000080)={0x3, 0x8000}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 20:42:34 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2cc0a5d8933a97626f9ac8549246"]) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:35 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2cc0a5d8933a97626f9ac8549246"]) 20:42:35 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_Vd=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000080)={0x3, 0x8000}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ffffffffffffff7f00000000000000303030303030303034ca8a8ddf2c757334725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 0: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2cc0a5d8933a97626f9ac8549246"]) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2cc0a5d8933a97626f9ac8549246"]) (async) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000']) 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) 20:42:35 executing program 2: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="3091db43128fa0535d303030303030303030302c75732dfe83eb1c65", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0x1001622, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653dcaddc3f730303030302c757365725f8700"/42, @ANYRESDEC, @ANYBLOB="2c6702f0700000000000", @ANYRESDEC=r1, @ANYBLOB=',allow_other,blksize=0x0000000000000600,max_read=0x0000000000000006,fowner>', @ANYRESDEC=0xee00, @ANYBLOB=',smackfstransmute=.(-^^{[,\x00']) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0)="33a41d066a31f20659ba0e559be7427bfd741624d8cd22d9caa4851b4d61771ddcf10140fa8ec2e780756ffab2db3cfd6e52bcb514beec7da7b0cf72f92cb5b6005115f14297d742794039ca42a64f473142fff7d3056a4abae7f62c51df127228d680b7b0f69cce836e66f37c44", 0x6e, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r0, 0x97, 0x3d}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305\x00'}}, &(0x7f0000000300)="2eca2f176b4383bda7841b51e29e241c4bda1c7e4048640abcb04e4dae5ced406721c116c37840ab533a76de96d399c068e1a7e43bd5445fb1954dcb7ed9c60f1178a61040be47ea65f08adbf54c8af9eaedfa962d6ecc1f204305495432b780c5991c760b00f086992a3ddef21f7c06ccc7eddf41bf8a87a8bc6a9166e6ea278027cfbaff2ef70cbb961d98f4c4988d5fcfdefdd9a76c", &(0x7f00000003c0)=""/61) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f00000002c0)="6bbf875a42725c742d5f9b0b4ff1644fae00053aa1bce8707043806cc21ef7c96ee1bf99eeb08d", &(0x7f0000000300)=@tcp, 0x4}, 0x20) 20:42:35 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f00000002c0)="6bbf875a42725c742d5f9b0b4ff1644fae00053aa1bce8707043806cc21ef7c96ee1bf99eeb08d", &(0x7f0000000300)=@tcp, 0x4}, 0x20) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) r0 = add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0)="33a41d066a31f20659ba0e559be7427bfd741624d8cd22d9caa4851b4d61771ddcf10140fa8ec2e780756ffab2db3cfd6e52bcb514beec7da7b0cf72f92cb5b6005115f14297d742794039ca42a64f473142fff7d3056a4abae7f62c51df127228d680b7b0f69cce836e66f37c44", 0x6e, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r0, 0x97, 0x3d}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305\x00'}}, &(0x7f0000000300)="2eca2f176b4383bda7841b51e29e241c4bda1c7e4048640abcb04e4dae5ced406721c116c37840ab533a76de96d399c068e1a7e43bd5445fb1954dcb7ed9c60f1178a61040be47ea65f08adbf54c8af9eaedfa962d6ecc1f204305495432b780c5991c760b00f086992a3ddef21f7c06ccc7eddf41bf8a87a8bc6a9166e6ea278027cfbaff2ef70cbb961d98f4c4988d5fcfdefdd9a76c", &(0x7f00000003c0)=""/61) 20:42:35 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) r0 = add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0)="33a41d066a31f20659ba0e559be7427bfd741624d8cd22d9caa4851b4d61771ddcf10140fa8ec2e780756ffab2db3cfd6e52bcb514beec7da7b0cf72f92cb5b6005115f14297d742794039ca42a64f473142fff7d3056a4abae7f62c51df127228d680b7b0f69cce836e66f37c44", 0x6e, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r0, 0x97, 0x3d}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305\x00'}}, &(0x7f0000000300)="2eca2f176b4383bda7841b51e29e241c4bda1c7e4048640abcb04e4dae5ced406721c116c37840ab533a76de96d399c068e1a7e43bd5445fb1954dcb7ed9c60f1178a61040be47ea65f08adbf54c8af9eaedfa962d6ecc1f204305495432b780c5991c760b00f086992a3ddef21f7c06ccc7eddf41bf8a87a8bc6a9166e6ea278027cfbaff2ef70cbb961d98f4c4988d5fcfdefdd9a76c", &(0x7f00000003c0)=""/61) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}}) (async) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000001c0)="33a41d066a31f20659ba0e559be7427bfd741624d8cd22d9caa4851b4d61771ddcf10140fa8ec2e780756ffab2db3cfd6e52bcb514beec7da7b0cf72f92cb5b6005115f14297d742794039ca42a64f473142fff7d3056a4abae7f62c51df127228d680b7b0f69cce836e66f37c44", 0x6e, 0xffffffffffffffff) (async) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r0, 0x97, 0x3d}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305\x00'}}, &(0x7f0000000300)="2eca2f176b4383bda7841b51e29e241c4bda1c7e4048640abcb04e4dae5ced406721c116c37840ab533a76de96d399c068e1a7e43bd5445fb1954dcb7ed9c60f1178a61040be47ea65f08adbf54c8af9eaedfa962d6ecc1f204305495432b780c5991c760b00f086992a3ddef21f7c06ccc7eddf41bf8a87a8bc6a9166e6ea278027cfbaff2ef70cbb961d98f4c4988d5fcfdefdd9a76c", &(0x7f00000003c0)=""/61) (async) 20:42:35 executing program 4: mount$fuseblk(0x0, &(0x7f0000001000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1000442, 0x0) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f00000002c0)="6bbf875a42725c742d5f9b0b4ff1644fae00053aa1bce8707043806cc21ef7c96ee1bf99eeb08d", &(0x7f0000000300)=@tcp, 0x4}, 0x20) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) [ 2319.536235] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2319.560906] PF_BRIDGE: RTM_SETLINK with unknown ifindex 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 1) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 1) 20:42:35 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,use']) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f00000002c0)="6bbf875a42725c742d5f9b0b4ff1644fae00053aa1bce8707043806cc21ef7c96ee1bf99eeb08d", &(0x7f0000000300)=@tcp, 0x4}, 0x20) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2319.645630] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2319.673482] FAULT_INJECTION: forcing a failure. [ 2319.673482] name failslab, interval 1, probability 0, space 0, times 0 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:35 executing program 2: mount$fuseblk(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) [ 2319.705615] FAULT_INJECTION: forcing a failure. [ 2319.705615] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.734955] CPU: 1 PID: 9726 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2319.742750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) [ 2319.749812] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2319.752091] Call Trace: [ 2319.752123] dump_stack+0x1b2/0x281 [ 2319.752138] should_fail.cold+0x10a/0x149 [ 2319.752152] should_failslab+0xd6/0x130 [ 2319.752166] __kmalloc_track_caller+0x2bc/0x400 [ 2319.776407] ? strndup_user+0x5b/0xf0 [ 2319.780202] memdup_user+0x22/0xa0 [ 2319.783733] strndup_user+0x5b/0xf0 [ 2319.787351] ? copy_mnt_ns+0xa30/0xa30 [ 2319.791231] SyS_mount+0x39/0x120 [ 2319.794676] ? copy_mnt_ns+0xa30/0xa30 [ 2319.798560] do_syscall_64+0x1d5/0x640 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2319.802446] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2319.807626] RIP: 0033:0x7f80eb4535a9 [ 2319.807713] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2319.811320] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2319.811332] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2319.811338] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2319.811344] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2319.811349] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2319.811355] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2319.824653] CPU: 1 PID: 9735 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2319.868611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2319.877952] Call Trace: [ 2319.880535] dump_stack+0x1b2/0x281 [ 2319.884162] should_fail.cold+0x10a/0x149 [ 2319.888307] should_failslab+0xd6/0x130 [ 2319.892279] __kmalloc_track_caller+0x2bc/0x400 [ 2319.896943] ? strndup_user+0x5b/0xf0 [ 2319.900741] memdup_user+0x22/0xa0 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 2) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) [ 2319.904277] strndup_user+0x5b/0xf0 [ 2319.907894] ? copy_mnt_ns+0xa30/0xa30 [ 2319.911774] SyS_mount+0x39/0x120 [ 2319.915219] ? copy_mnt_ns+0xa30/0xa30 [ 2319.919100] do_syscall_64+0x1d5/0x640 [ 2319.922988] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2319.928174] RIP: 0033:0x7f615ecaf5a9 [ 2319.931877] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2319.939584] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2319.946847] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2319.947378] FAULT_INJECTION: forcing a failure. [ 2319.947378] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.954107] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2319.954113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2319.954118] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 [ 2319.962967] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2319.990210] CPU: 0 PID: 9757 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2320.000420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2320.009756] Call Trace: [ 2320.012319] dump_stack+0x1b2/0x281 [ 2320.015923] should_fail.cold+0x10a/0x149 [ 2320.020048] should_failslab+0xd6/0x130 [ 2320.023999] __kmalloc_track_caller+0x2bc/0x400 [ 2320.028640] ? strndup_user+0x5b/0xf0 [ 2320.032415] memdup_user+0x22/0xa0 [ 2320.035932] strndup_user+0x5b/0xf0 [ 2320.039533] ? copy_mnt_ns+0xa30/0xa30 [ 2320.043395] SyS_mount+0x68/0x120 [ 2320.046820] ? copy_mnt_ns+0xa30/0xa30 [ 2320.050686] do_syscall_64+0x1d5/0x640 20:42:35 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 2) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 2: mount$fuseblk(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x33, 0x0, 0x2, 0x60, 0x1, 0x3, '\x00', r0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) [ 2320.054549] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2320.059710] RIP: 0033:0x7f80eb4535a9 [ 2320.063396] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2320.071078] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2320.078323] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2320.085567] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.092815] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2320.100060] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 20:42:35 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 3) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:35 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:35 executing program 2: mount$fuseblk(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) 20:42:35 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2320.170612] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2320.178630] FAULT_INJECTION: forcing a failure. [ 2320.178630] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.197435] FAULT_INJECTION: forcing a failure. [ 2320.197435] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.228038] CPU: 0 PID: 9773 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2320.235839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2320.245182] Call Trace: [ 2320.247766] dump_stack+0x1b2/0x281 [ 2320.249933] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2320.251391] should_fail.cold+0x10a/0x149 [ 2320.251406] should_failslab+0xd6/0x130 [ 2320.251419] __kmalloc_track_caller+0x2bc/0x400 [ 2320.251427] ? strndup_user+0x5b/0xf0 [ 2320.251438] memdup_user+0x22/0xa0 20:42:35 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,u']) [ 2320.251448] strndup_user+0x5b/0xf0 [ 2320.251457] ? copy_mnt_ns+0xa30/0xa30 [ 2320.251467] SyS_mount+0x68/0x120 [ 2320.251474] ? copy_mnt_ns+0xa30/0xa30 [ 2320.251489] do_syscall_64+0x1d5/0x640 [ 2320.295511] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2320.300692] RIP: 0033:0x7f615ecaf5a9 [ 2320.304389] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2320.312085] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2320.319337] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2320.326589] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2320.333841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2320.341094] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 [ 2320.348355] CPU: 1 PID: 9774 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2320.356144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2320.365486] Call Trace: [ 2320.368067] dump_stack+0x1b2/0x281 [ 2320.371692] should_fail.cold+0x10a/0x149 [ 2320.375835] should_failslab+0xd6/0x130 [ 2320.379806] kmem_cache_alloc+0x28e/0x3c0 [ 2320.383953] getname_flags+0xc8/0x550 [ 2320.387754] user_path_at_empty+0x2a/0x50 [ 2320.391898] do_mount+0x118/0x2a30 [ 2320.395434] ? lock_acquire+0x170/0x3f0 [ 2320.399406] ? lock_downgrade+0x740/0x740 [ 2320.403556] ? copy_mount_string+0x40/0x40 [ 2320.407775] ? __might_fault+0x177/0x1b0 [ 2320.411815] ? _copy_from_user+0x96/0x100 [ 2320.415942] ? copy_mount_options+0x1fa/0x2f0 [ 2320.420409] ? copy_mnt_ns+0xa30/0xa30 [ 2320.424271] SyS_mount+0xa8/0x120 [ 2320.427699] ? copy_mnt_ns+0xa30/0xa30 [ 2320.431567] do_syscall_64+0x1d5/0x640 [ 2320.435443] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2320.440605] RIP: 0033:0x7f80eb4535a9 [ 2320.444289] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2320.451969] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2320.459213] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2320.466455] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 20:42:36 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 3) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, 0x0, 0x55402, 0x0) 20:42:36 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:36 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:36 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 4) [ 2320.473699] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2320.480942] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 20:42:36 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:36 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, 0x0, 0x55402, 0x0) [ 2320.535905] FAULT_INJECTION: forcing a failure. [ 2320.535905] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.575353] FAULT_INJECTION: forcing a failure. 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f00000001c0)=@secondary) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2320.575353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2320.587155] CPU: 1 PID: 9802 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2320.594941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2320.604285] Call Trace: [ 2320.606864] dump_stack+0x1b2/0x281 [ 2320.610495] should_fail.cold+0x10a/0x149 [ 2320.614640] __alloc_pages_nodemask+0x22c/0x2720 [ 2320.619389] ? deref_stack_reg+0x124/0x1a0 [ 2320.623622] ? __lock_acquire+0x5fc/0x3f20 [ 2320.627862] ? gfp_pfmemalloc_allowed+0x150/0x150 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2320.632699] ? kernel_text_address+0xbd/0xf0 [ 2320.637103] ? lock_downgrade+0x740/0x740 [ 2320.641245] ? __kernel_text_address+0x9/0x30 [ 2320.645734] ? unwind_get_return_address+0x51/0x90 [ 2320.650664] ? depot_save_stack+0x10d/0x3f0 [ 2320.654990] cache_grow_begin+0x91/0x700 [ 2320.659061] ? fs_reclaim_release+0xd0/0x110 [ 2320.663457] ? check_preemption_disabled+0x35/0x240 [ 2320.668465] cache_alloc_refill+0x273/0x350 [ 2320.672771] kmem_cache_alloc+0x333/0x3c0 [ 2320.676903] getname_flags+0xc8/0x550 [ 2320.680687] user_path_at_empty+0x2a/0x50 [ 2320.684813] do_mount+0x118/0x2a30 [ 2320.688334] ? lock_acquire+0x170/0x3f0 [ 2320.692289] ? lock_downgrade+0x740/0x740 [ 2320.696421] ? copy_mount_string+0x40/0x40 [ 2320.700639] ? __might_fault+0x177/0x1b0 [ 2320.704683] ? _copy_from_user+0x96/0x100 [ 2320.708817] ? copy_mount_options+0x1fa/0x2f0 [ 2320.713293] ? copy_mnt_ns+0xa30/0xa30 [ 2320.717162] SyS_mount+0xa8/0x120 [ 2320.720596] ? copy_mnt_ns+0xa30/0xa30 [ 2320.724467] do_syscall_64+0x1d5/0x640 [ 2320.728338] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2320.733504] RIP: 0033:0x7f80eb4535a9 [ 2320.737200] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2320.744885] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2320.752133] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2320.759380] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2320.766629] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2320.773880] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2320.781142] CPU: 0 PID: 9801 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2320.788933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2320.794913] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2320.798273] Call Trace: [ 2320.798286] dump_stack+0x1b2/0x281 [ 2320.798300] should_fail.cold+0x10a/0x149 [ 2320.798312] should_failslab+0xd6/0x130 [ 2320.817914] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2320.822576] ? copy_mnt_ns+0xa30/0xa30 [ 2320.826458] copy_mount_options+0x59/0x2f0 [ 2320.830685] ? copy_mnt_ns+0xa30/0xa30 [ 2320.834566] SyS_mount+0x84/0x120 [ 2320.838011] ? copy_mnt_ns+0xa30/0xa30 [ 2320.841890] do_syscall_64+0x1d5/0x640 [ 2320.845782] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2320.850957] RIP: 0033:0x7f615ecaf5a9 [ 2320.854649] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2320.862347] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2320.869593] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2320.876840] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 20:42:36 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 4) 20:42:36 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:36 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), 0x0, 0x0, 0x55402, 0x0) 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:36 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 5) [ 2320.884084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2320.891329] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 20:42:36 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 1) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) 20:42:36 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000100']) [ 2320.953674] FAULT_INJECTION: forcing a failure. [ 2320.953674] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.973452] FAULT_INJECTION: forcing a failure. [ 2320.973452] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.982394] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2320.988212] FAULT_INJECTION: forcing a failure. [ 2320.988212] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.010272] CPU: 0 PID: 9830 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2321.018066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.027405] Call Trace: [ 2321.029985] dump_stack+0x1b2/0x281 [ 2321.033621] should_fail.cold+0x10a/0x149 [ 2321.037765] should_failslab+0xd6/0x130 [ 2321.041737] kmem_cache_alloc+0x28e/0x3c0 [ 2321.045882] alloc_vfsmnt+0x23/0x7f0 [ 2321.049589] ? _raw_read_unlock+0x29/0x40 [ 2321.053736] vfs_kern_mount.part.0+0x27/0x470 [ 2321.055836] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2321.058225] do_mount+0xe65/0x2a30 [ 2321.058238] ? lock_acquire+0x170/0x3f0 [ 2321.058248] ? lock_downgrade+0x740/0x740 [ 2321.058260] ? copy_mount_string+0x40/0x40 [ 2321.058269] ? __might_fault+0x177/0x1b0 [ 2321.058281] ? _copy_from_user+0x96/0x100 [ 2321.087622] ? copy_mount_options+0x1fa/0x2f0 [ 2321.092113] ? copy_mnt_ns+0xa30/0xa30 [ 2321.096000] SyS_mount+0xa8/0x120 [ 2321.099447] ? copy_mnt_ns+0xa30/0xa30 [ 2321.103329] do_syscall_64+0x1d5/0x640 20:42:36 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) 20:42:36 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) [ 2321.107216] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.112394] RIP: 0033:0x7f80eb4535a9 [ 2321.116096] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.123792] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2321.131049] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2321.138301] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2321.145553] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2321.152806] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2321.160067] CPU: 1 PID: 9837 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2321.167861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.177202] Call Trace: [ 2321.179774] dump_stack+0x1b2/0x281 [ 2321.183388] should_fail.cold+0x10a/0x149 [ 2321.187521] should_failslab+0xd6/0x130 [ 2321.191486] __kmalloc_track_caller+0x2bc/0x400 [ 2321.196137] ? strndup_user+0x5b/0xf0 [ 2321.199919] memdup_user+0x22/0xa0 [ 2321.203442] strndup_user+0x5b/0xf0 [ 2321.207054] ? copy_mnt_ns+0xa30/0xa30 [ 2321.210919] SyS_mount+0x39/0x120 [ 2321.214353] ? copy_mnt_ns+0xa30/0xa30 [ 2321.218224] do_syscall_64+0x1d5/0x640 [ 2321.222094] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.227260] RIP: 0033:0x7fd08e0895a9 [ 2321.230948] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.238639] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2321.245887] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2321.253135] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2321.260388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2321.267644] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2321.274907] CPU: 0 PID: 9832 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2321.282694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.292035] Call Trace: [ 2321.294614] dump_stack+0x1b2/0x281 [ 2321.298240] should_fail.cold+0x10a/0x149 [ 2321.302379] should_failslab+0xd6/0x130 [ 2321.306339] kmem_cache_alloc+0x28e/0x3c0 [ 2321.310473] getname_flags+0xc8/0x550 [ 2321.314262] user_path_at_empty+0x2a/0x50 [ 2321.318392] do_mount+0x118/0x2a30 [ 2321.321916] ? copy_mount_string+0x40/0x40 [ 2321.326136] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2321.331136] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 2321.335963] ? copy_mnt_ns+0xa30/0xa30 [ 2321.339829] ? copy_mount_options+0x1fa/0x2f0 [ 2321.344309] ? copy_mnt_ns+0xa30/0xa30 [ 2321.348180] SyS_mount+0xa8/0x120 [ 2321.351612] ? copy_mnt_ns+0xa30/0xa30 [ 2321.355478] do_syscall_64+0x1d5/0x640 20:42:37 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 5) 20:42:37 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001700), 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) 20:42:37 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 1) 20:42:37 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 2) 20:42:37 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 6) [ 2321.359345] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.364514] RIP: 0033:0x7f615ecaf5a9 [ 2321.368207] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.375888] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2321.383134] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2321.390381] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2321.397631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2321.404885] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) [ 2321.462867] FAULT_INJECTION: forcing a failure. [ 2321.462867] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.472694] FAULT_INJECTION: forcing a failure. [ 2321.472694] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.475676] FAULT_INJECTION: forcing a failure. [ 2321.475676] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.495738] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2321.498212] FAULT_INJECTION: forcing a failure. [ 2321.498212] name failslab, interval 1, probability 0, space 0, times 0 20:42:37 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66642f5dc4d7db0b178c5730c5e39f1980ae53588e1b717cc7bea3e92b764281b8cb0ebfcc01d426dbfaa2ce1c33ae3c4d30d25ed9d7a1d988e5ebfd388515efc1f9720687bea9e832", @ANYRESHEX, @ANYBLOB="2c726f6f74776f64653d30303030323030303030300500303030303030303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',\b\x00oup_i\x00t', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2321.519769] CPU: 0 PID: 9856 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2321.527565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.536908] Call Trace: [ 2321.539497] dump_stack+0x1b2/0x281 [ 2321.543121] should_fail.cold+0x10a/0x149 [ 2321.547266] should_failslab+0xd6/0x130 [ 2321.551238] __kmalloc_track_caller+0x2bc/0x400 [ 2321.555908] ? kstrdup_const+0x35/0x60 [ 2321.559792] ? lock_downgrade+0x740/0x740 [ 2321.563939] kstrdup+0x36/0x70 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=0000000000000000001000']) [ 2321.567128] kstrdup_const+0x35/0x60 [ 2321.570834] alloc_vfsmnt+0xe0/0x7f0 [ 2321.574537] ? _raw_read_unlock+0x29/0x40 [ 2321.578682] vfs_kern_mount.part.0+0x27/0x470 [ 2321.583175] do_mount+0xe65/0x2a30 [ 2321.586714] ? lock_acquire+0x170/0x3f0 [ 2321.590683] ? lock_downgrade+0x740/0x740 [ 2321.594830] ? copy_mount_string+0x40/0x40 [ 2321.599056] ? __might_fault+0x177/0x1b0 [ 2321.602292] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2321.603108] ? _copy_from_user+0x96/0x100 [ 2321.612578] ? copy_mount_options+0x1fa/0x2f0 20:42:37 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) [ 2321.617068] ? copy_mnt_ns+0xa30/0xa30 [ 2321.620952] SyS_mount+0xa8/0x120 [ 2321.624391] ? copy_mnt_ns+0xa30/0xa30 [ 2321.628278] do_syscall_64+0x1d5/0x640 [ 2321.632165] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.637343] RIP: 0033:0x7f80eb4535a9 [ 2321.641040] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.648749] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2321.656011] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2321.663271] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) [ 2321.670525] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2321.677784] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2321.686070] CPU: 0 PID: 9858 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2321.693860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.703200] Call Trace: [ 2321.705780] dump_stack+0x1b2/0x281 [ 2321.709396] should_fail.cold+0x10a/0x149 [ 2321.713528] should_failslab+0xd6/0x130 [ 2321.717496] __kmalloc_track_caller+0x2bc/0x400 [ 2321.722154] ? strndup_user+0x5b/0xf0 [ 2321.725948] memdup_user+0x22/0xa0 [ 2321.729476] strndup_user+0x5b/0xf0 [ 2321.733090] ? copy_mnt_ns+0xa30/0xa30 [ 2321.736964] SyS_mount+0x68/0x120 [ 2321.740404] ? copy_mnt_ns+0xa30/0xa30 [ 2321.744280] do_syscall_64+0x1d5/0x640 [ 2321.748158] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.753337] RIP: 0033:0x7fd08e0895a9 [ 2321.755426] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2321.757030] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.757041] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2321.757047] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2321.757053] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2321.757058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2321.757064] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2321.757566] CPU: 0 PID: 9857 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2321.814172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.823507] Call Trace: [ 2321.826085] dump_stack+0x1b2/0x281 [ 2321.829699] should_fail.cold+0x10a/0x149 [ 2321.833840] should_failslab+0xd6/0x130 [ 2321.837800] kmem_cache_alloc+0x28e/0x3c0 [ 2321.841929] alloc_vfsmnt+0x23/0x7f0 [ 2321.845628] ? _raw_read_unlock+0x29/0x40 [ 2321.849761] vfs_kern_mount.part.0+0x27/0x470 [ 2321.854240] do_mount+0xe65/0x2a30 [ 2321.857769] ? copy_mount_string+0x40/0x40 [ 2321.861992] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2321.866991] ? copy_mnt_ns+0xa30/0xa30 [ 2321.870862] ? copy_mount_options+0x1fa/0x2f0 [ 2321.875339] ? copy_mnt_ns+0xa30/0xa30 [ 2321.879207] SyS_mount+0xa8/0x120 [ 2321.882638] ? copy_mnt_ns+0xa30/0xa30 [ 2321.886514] do_syscall_64+0x1d5/0x640 [ 2321.890388] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.895556] RIP: 0033:0x7f615ecaf5a9 [ 2321.899244] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2321.906933] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2321.914186] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2321.921436] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2321.928688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2321.935935] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 [ 2321.943195] CPU: 1 PID: 9861 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2321.950985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2321.960330] Call Trace: [ 2321.962911] dump_stack+0x1b2/0x281 [ 2321.966538] should_fail.cold+0x10a/0x149 20:42:37 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 6) 20:42:37 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000010000']) [ 2321.970685] should_failslab+0xd6/0x130 [ 2321.974657] __kmalloc_track_caller+0x2bc/0x400 [ 2321.979319] ? strndup_user+0x5b/0xf0 [ 2321.983118] memdup_user+0x22/0xa0 [ 2321.986654] strndup_user+0x5b/0xf0 [ 2321.990271] ? copy_mnt_ns+0xa30/0xa30 [ 2321.992130] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2321.994149] SyS_mount+0x68/0x120 [ 2321.994159] ? copy_mnt_ns+0xa30/0xa30 [ 2321.994171] do_syscall_64+0x1d5/0x640 [ 2321.994187] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2321.994198] RIP: 0033:0x7fbbd38d55a9 [ 2322.000091] FAULT_INJECTION: forcing a failure. [ 2322.000091] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.002971] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.002982] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2322.002988] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2322.002994] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.002999] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 20:42:37 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 2) 20:42:37 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 3) 20:42:37 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 7) 20:42:37 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2322.003005] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 [ 2322.089395] FAULT_INJECTION: forcing a failure. [ 2322.089395] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.106778] FAULT_INJECTION: forcing a failure. [ 2322.106778] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.123844] CPU: 0 PID: 9888 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2322.131640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.140984] Call Trace: [ 2322.143568] dump_stack+0x1b2/0x281 [ 2322.144823] FAULT_INJECTION: forcing a failure. [ 2322.144823] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.147192] should_fail.cold+0x10a/0x149 [ 2322.147206] should_failslab+0xd6/0x130 [ 2322.147219] kmem_cache_alloc_trace+0x29a/0x3d0 20:42:37 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2322.147229] ? copy_mnt_ns+0xa30/0xa30 [ 2322.147240] copy_mount_options+0x59/0x2f0 [ 2322.147248] ? copy_mnt_ns+0xa30/0xa30 [ 2322.147259] SyS_mount+0x84/0x120 [ 2322.147267] ? copy_mnt_ns+0xa30/0xa30 [ 2322.147278] do_syscall_64+0x1d5/0x640 [ 2322.147297] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.170838] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2322.171193] RIP: 0033:0x7fd08e0895a9 [ 2322.208501] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.216200] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 20:42:37 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2322.223462] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2322.230719] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2322.237977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2322.245237] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2322.252504] CPU: 1 PID: 9896 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2322.260292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.269624] Call Trace: [ 2322.272200] dump_stack+0x1b2/0x281 [ 2322.275821] should_fail.cold+0x10a/0x149 [ 2322.279956] should_failslab+0xd6/0x130 [ 2322.283921] kmem_cache_alloc+0x28e/0x3c0 [ 2322.288054] getname_kernel+0x4e/0x340 [ 2322.291928] kern_path+0x1b/0x40 [ 2322.295275] lookup_bdev+0xc6/0x1c0 [ 2322.298886] ? bd_acquire+0x440/0x440 [ 2322.302665] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2322.308095] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2322.313090] blkdev_get_by_path+0x1b/0xa0 [ 2322.317219] mount_bdev+0x4c/0x360 [ 2322.320740] ? fuse_get_root_inode+0xc0/0xc0 [ 2322.325126] mount_fs+0x92/0x2a0 [ 2322.328476] vfs_kern_mount.part.0+0x5b/0x470 [ 2322.332966] do_mount+0xe65/0x2a30 [ 2322.336485] ? lock_acquire+0x170/0x3f0 [ 2322.340438] ? lock_downgrade+0x740/0x740 [ 2322.344567] ? copy_mount_string+0x40/0x40 [ 2322.348787] ? __might_fault+0x177/0x1b0 [ 2322.352830] ? _copy_from_user+0x96/0x100 [ 2322.356961] ? copy_mount_options+0x1fa/0x2f0 [ 2322.361433] ? copy_mnt_ns+0xa30/0xa30 [ 2322.365300] SyS_mount+0xa8/0x120 [ 2322.368738] ? copy_mnt_ns+0xa30/0xa30 [ 2322.372605] do_syscall_64+0x1d5/0x640 [ 2322.376562] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.381732] RIP: 0033:0x7f80eb4535a9 [ 2322.385426] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.393111] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2322.400358] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2322.407605] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.414855] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 20:42:38 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2322.422110] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2322.429379] CPU: 0 PID: 9882 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2322.437167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.446511] Call Trace: [ 2322.449100] dump_stack+0x1b2/0x281 [ 2322.452729] should_fail.cold+0x10a/0x149 [ 2322.456879] should_failslab+0xd6/0x130 [ 2322.460850] kmem_cache_alloc+0x28e/0x3c0 [ 2322.464995] alloc_vfsmnt+0x23/0x7f0 [ 2322.468706] ? _raw_read_unlock+0x29/0x40 20:42:38 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2322.472848] vfs_kern_mount.part.0+0x27/0x470 [ 2322.477338] do_mount+0xe65/0x2a30 [ 2322.480884] ? copy_mount_string+0x40/0x40 [ 2322.485122] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2322.490134] ? copy_mnt_ns+0xa30/0xa30 [ 2322.494020] ? copy_mount_options+0x1fa/0x2f0 [ 2322.498510] ? copy_mnt_ns+0xa30/0xa30 [ 2322.502395] SyS_mount+0xa8/0x120 [ 2322.505842] ? copy_mnt_ns+0xa30/0xa30 [ 2322.509721] do_syscall_64+0x1d5/0x640 [ 2322.513606] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.518786] RIP: 0033:0x7f615ecaf5a9 [ 2322.522486] RSP: 002b:00007f615d623168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.530186] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2322.537447] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2322.544701] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2322.551956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2322.559217] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 [ 2322.579568] CPU: 1 PID: 9892 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2322.587365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.596646] FAULT_INJECTION: forcing a failure. [ 2322.596646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2322.596711] Call Trace: [ 2322.611053] dump_stack+0x1b2/0x281 [ 2322.614670] should_fail.cold+0x10a/0x149 [ 2322.618803] should_failslab+0xd6/0x130 [ 2322.622758] kmem_cache_alloc+0x28e/0x3c0 [ 2322.626891] getname_flags+0xc8/0x550 [ 2322.630677] user_path_at_empty+0x2a/0x50 [ 2322.634807] do_mount+0x118/0x2a30 [ 2322.638327] ? lock_acquire+0x170/0x3f0 [ 2322.642281] ? lock_downgrade+0x740/0x740 [ 2322.646410] ? copy_mount_string+0x40/0x40 [ 2322.650622] ? __might_fault+0x177/0x1b0 [ 2322.654671] ? _copy_from_user+0x96/0x100 [ 2322.658798] ? copy_mount_options+0x1fa/0x2f0 [ 2322.663271] ? copy_mnt_ns+0xa30/0xa30 [ 2322.667137] SyS_mount+0xa8/0x120 [ 2322.670571] ? copy_mnt_ns+0xa30/0xa30 [ 2322.674442] do_syscall_64+0x1d5/0x640 [ 2322.678313] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.683480] RIP: 0033:0x7fbbd38d55a9 [ 2322.687169] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.694859] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2322.702107] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2322.709356] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.716605] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 20:42:38 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 7) 20:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x800) 20:42:38 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 8) [ 2322.723856] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 [ 2322.731118] CPU: 0 PID: 9912 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2322.738900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.748238] Call Trace: [ 2322.750818] dump_stack+0x1b2/0x281 [ 2322.754444] should_fail.cold+0x10a/0x149 [ 2322.758590] __alloc_pages_nodemask+0x22c/0x2720 [ 2322.763340] ? __lock_acquire+0x5fc/0x3f20 [ 2322.767576] ? __lock_acquire+0x5fc/0x3f20 [ 2322.771823] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.777182] ? trace_hardirqs_on+0x10/0x10 [ 2322.781410] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2322.786244] ? depot_save_stack+0x10d/0x3f0 [ 2322.790565] ? __lock_acquire+0x5fc/0x3f20 [ 2322.792715] FAULT_INJECTION: forcing a failure. [ 2322.792715] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.794792] ? kstrdup_const+0x35/0x60 [ 2322.809830] ? lock_acquire+0x170/0x3f0 [ 2322.813797] cache_grow_begin+0x91/0x700 [ 2322.817838] ? fs_reclaim_release+0xd0/0x110 [ 2322.822228] ? check_preemption_disabled+0x35/0x240 [ 2322.827234] cache_alloc_refill+0x273/0x350 [ 2322.831551] kmem_cache_alloc+0x333/0x3c0 [ 2322.835684] getname_kernel+0x4e/0x340 [ 2322.839552] kern_path+0x1b/0x40 [ 2322.842900] lookup_bdev+0xc6/0x1c0 [ 2322.846505] ? bd_acquire+0x440/0x440 [ 2322.850282] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2322.855712] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2322.860709] blkdev_get_by_path+0x1b/0xa0 [ 2322.864836] mount_bdev+0x4c/0x360 [ 2322.868363] ? fuse_get_root_inode+0xc0/0xc0 [ 2322.872758] mount_fs+0x92/0x2a0 [ 2322.876110] vfs_kern_mount.part.0+0x5b/0x470 [ 2322.880585] do_mount+0xe65/0x2a30 [ 2322.884104] ? lock_acquire+0x170/0x3f0 [ 2322.888062] ? lock_downgrade+0x740/0x740 [ 2322.892195] ? copy_mount_string+0x40/0x40 [ 2322.896415] ? __might_fault+0x177/0x1b0 [ 2322.900458] ? _copy_from_user+0x96/0x100 [ 2322.904584] ? copy_mount_options+0x1fa/0x2f0 [ 2322.909068] ? copy_mnt_ns+0xa30/0xa30 [ 2322.912941] SyS_mount+0xa8/0x120 [ 2322.916375] ? copy_mnt_ns+0xa30/0xa30 [ 2322.920241] do_syscall_64+0x1d5/0x640 [ 2322.924115] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2322.929285] RIP: 0033:0x7f80eb4535a9 [ 2322.932977] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.940665] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2322.947917] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2322.955168] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2322.962418] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2322.969666] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2322.976930] CPU: 1 PID: 9913 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 [ 2322.984721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2322.994066] Call Trace: [ 2322.996647] dump_stack+0x1b2/0x281 [ 2323.000273] should_fail.cold+0x10a/0x149 [ 2323.004418] should_failslab+0xd6/0x130 [ 2323.008390] __kmalloc_track_caller+0x2bc/0x400 [ 2323.013047] ? kstrdup_const+0x35/0x60 [ 2323.016925] ? lock_downgrade+0x740/0x740 [ 2323.021068] kstrdup+0x36/0x70 [ 2323.024255] kstrdup_const+0x35/0x60 [ 2323.027966] alloc_vfsmnt+0xe0/0x7f0 [ 2323.031675] ? _raw_read_unlock+0x29/0x40 [ 2323.035818] vfs_kern_mount.part.0+0x27/0x470 [ 2323.040310] do_mount+0xe65/0x2a30 [ 2323.043865] ? copy_mount_string+0x40/0x40 [ 2323.048096] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2323.053109] ? copy_mnt_ns+0xa30/0xa30 [ 2323.056994] ? copy_mount_options+0x1fa/0x2f0 [ 2323.061483] ? copy_mnt_ns+0xa30/0xa30 [ 2323.061915] FAULT_INJECTION: forcing a failure. [ 2323.061915] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.065361] SyS_mount+0xa8/0x120 [ 2323.065371] ? copy_mnt_ns+0xa30/0xa30 [ 2323.065384] do_syscall_64+0x1d5/0x640 [ 2323.065399] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2323.065408] RIP: 0033:0x7f615ecaf5a9 [ 2323.065418] RSP: 002b:00007f615d623168 EFLAGS: 00000246 [ 2323.089719] FAULT_INJECTION: forcing a failure. [ 2323.089719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2323.092920] ORIG_RAX: 00000000000000a5 [ 2323.117652] RAX: ffffffffffffffda RBX: 00007f615edd0f80 RCX: 00007f615ecaf5a9 [ 2323.124904] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 20:42:38 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 3) 20:42:38 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:38 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 4) 20:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x800) 20:42:38 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 9) [ 2323.132152] RBP: 00007f615d6231d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2323.139401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2323.146649] R13: 00007ffc05e109bf R14: 00007f615d623300 R15: 0000000000022000 [ 2323.153913] CPU: 0 PID: 9927 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2323.161698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2323.171037] Call Trace: [ 2323.172299] FAULT_INJECTION: forcing a failure. [ 2323.172299] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.173613] dump_stack+0x1b2/0x281 [ 2323.173633] should_fail.cold+0x10a/0x149 [ 2323.192519] __alloc_pages_nodemask+0x22c/0x2720 [ 2323.197257] ? deref_stack_reg+0x124/0x1a0 [ 2323.201478] ? __lock_acquire+0x5fc/0x3f20 [ 2323.205694] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2323.210512] ? kernel_text_address+0xbd/0xf0 [ 2323.214897] ? lock_downgrade+0x740/0x740 [ 2323.219020] ? __kernel_text_address+0x9/0x30 [ 2323.223495] ? unwind_get_return_address+0x51/0x90 [ 2323.228407] ? depot_save_stack+0x10d/0x3f0 [ 2323.232717] cache_grow_begin+0x91/0x700 [ 2323.236758] ? fs_reclaim_release+0xd0/0x110 [ 2323.241153] ? check_preemption_disabled+0x35/0x240 [ 2323.246155] cache_alloc_refill+0x273/0x350 [ 2323.250459] kmem_cache_alloc+0x333/0x3c0 [ 2323.254598] getname_flags+0xc8/0x550 [ 2323.258382] user_path_at_empty+0x2a/0x50 [ 2323.262510] do_mount+0x118/0x2a30 [ 2323.266031] ? lock_acquire+0x170/0x3f0 [ 2323.269987] ? lock_downgrade+0x740/0x740 [ 2323.274115] ? copy_mount_string+0x40/0x40 [ 2323.278334] ? __might_fault+0x177/0x1b0 20:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x800) [ 2323.282385] ? _copy_from_user+0x96/0x100 [ 2323.286519] ? copy_mount_options+0x1fa/0x2f0 [ 2323.291004] ? copy_mnt_ns+0xa30/0xa30 [ 2323.294887] SyS_mount+0xa8/0x120 [ 2323.298331] ? copy_mnt_ns+0xa30/0xa30 [ 2323.302210] do_syscall_64+0x1d5/0x640 [ 2323.306088] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2323.311267] RIP: 0033:0x7fbbd38d55a9 [ 2323.314964] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2323.322653] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:39 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2323.329907] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2323.337181] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2323.344440] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 [ 2323.351699] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 [ 2323.373145] CPU: 1 PID: 9930 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2323.380946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2323.390285] Call Trace: [ 2323.392856] dump_stack+0x1b2/0x281 [ 2323.396468] should_fail.cold+0x10a/0x149 [ 2323.400606] should_failslab+0xd6/0x130 [ 2323.404563] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2323.409211] ? set_bdev_super+0x110/0x110 [ 2323.413334] sget_userns+0x102/0xc10 [ 2323.417026] ? set_bdev_super+0x110/0x110 [ 2323.421154] ? ns_test_super+0x50/0x50 [ 2323.425019] ? set_bdev_super+0x110/0x110 [ 2323.429150] ? ns_test_super+0x50/0x50 [ 2323.433028] sget+0xd1/0x110 [ 2323.436033] mount_bdev+0xcd/0x360 [ 2323.439556] ? fuse_get_root_inode+0xc0/0xc0 [ 2323.443945] mount_fs+0x92/0x2a0 [ 2323.447293] vfs_kern_mount.part.0+0x5b/0x470 [ 2323.451767] do_mount+0xe65/0x2a30 [ 2323.455287] ? lock_acquire+0x170/0x3f0 [ 2323.459243] ? lock_downgrade+0x740/0x740 [ 2323.463374] ? copy_mount_string+0x40/0x40 [ 2323.467586] ? __might_fault+0x177/0x1b0 [ 2323.471626] ? _copy_from_user+0x96/0x100 [ 2323.475755] ? copy_mount_options+0x1fa/0x2f0 [ 2323.480235] ? copy_mnt_ns+0xa30/0xa30 [ 2323.484105] SyS_mount+0xa8/0x120 [ 2323.487544] ? copy_mnt_ns+0xa30/0xa30 [ 2323.491413] do_syscall_64+0x1d5/0x640 [ 2323.495285] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2323.500453] RIP: 0033:0x7f80eb4535a9 [ 2323.504141] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2323.511827] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2323.519074] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2323.526320] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2323.533575] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000001 [ 2323.540825] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2323.548086] CPU: 0 PID: 9925 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2323.555877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2323.565218] Call Trace: [ 2323.567806] dump_stack+0x1b2/0x281 [ 2323.571428] should_fail.cold+0x10a/0x149 [ 2323.575572] should_failslab+0xd6/0x130 [ 2323.579544] kmem_cache_alloc+0x28e/0x3c0 20:42:39 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2323.583687] getname_flags+0xc8/0x550 [ 2323.587484] user_path_at_empty+0x2a/0x50 [ 2323.591631] do_mount+0x118/0x2a30 [ 2323.595168] ? retint_kernel+0x2d/0x2d [ 2323.599053] ? copy_mount_string+0x40/0x40 [ 2323.603281] ? copy_mount_options+0x185/0x2f0 [ 2323.607770] ? copy_mount_options+0x19a/0x2f0 [ 2323.612257] ? copy_mount_options+0x1fa/0x2f0 [ 2323.616743] ? copy_mnt_ns+0xa30/0xa30 [ 2323.620625] SyS_mount+0xa8/0x120 [ 2323.624072] ? copy_mnt_ns+0xa30/0xa30 [ 2323.627943] do_syscall_64+0x1d5/0x640 20:42:39 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="76e32a", @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303130303030531d63e41ac4d162cdb169ae4dba567e339cf87a9856fe737133ffd3a14d9ce6577621472b5ad94192eeaf4eb8"]) 20:42:39 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:39 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 10) 20:42:39 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 4) 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2323.631822] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2323.636996] RIP: 0033:0x7fd08e0895a9 [ 2323.640681] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2323.648369] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2323.655620] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2323.662878] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2323.670127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2323.677379] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 20:42:39 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 5) 20:42:39 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="76e32a", @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303130303030531d63e41ac4d162cdb169ae4dba567e339cf87a9856fe737133ffd3a14d9ce6577621472b5ad94192eeaf4eb8"]) mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="76e32a", @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303130303030531d63e41ac4d162cdb169ae4dba567e339cf87a9856fe737133ffd3a14d9ce6577621472b5ad94192eeaf4eb8"]) (async) 20:42:39 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) [ 2323.734596] FAULT_INJECTION: forcing a failure. [ 2323.734596] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.752286] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2323.755733] FAULT_INJECTION: forcing a failure. [ 2323.755733] name failslab, interval 1, probability 0, space 0, times 0 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2323.781355] FAULT_INJECTION: forcing a failure. [ 2323.781355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2323.792795] CPU: 1 PID: 9949 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2323.800912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2323.810246] Call Trace: [ 2323.812817] dump_stack+0x1b2/0x281 [ 2323.816440] should_fail.cold+0x10a/0x149 [ 2323.820586] should_failslab+0xd6/0x130 [ 2323.824544] kmem_cache_alloc+0x28e/0x3c0 [ 2323.828688] getname_kernel+0x4e/0x340 [ 2323.832568] kern_path+0x1b/0x40 [ 2323.835917] do_mount+0xb78/0x2a30 [ 2323.839440] ? lock_acquire+0x170/0x3f0 [ 2323.843394] ? lock_downgrade+0x740/0x740 [ 2323.847524] ? copy_mount_string+0x40/0x40 [ 2323.851748] ? __might_fault+0x177/0x1b0 [ 2323.855793] ? _copy_from_user+0x96/0x100 [ 2323.859923] ? copy_mount_options+0x1fa/0x2f0 [ 2323.864394] ? copy_mnt_ns+0xa30/0xa30 [ 2323.868260] SyS_mount+0xa8/0x120 [ 2323.871706] ? copy_mnt_ns+0xa30/0xa30 [ 2323.875575] do_syscall_64+0x1d5/0x640 [ 2323.879446] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2323.884614] RIP: 0033:0x7fbbd38d55a9 [ 2323.888303] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2323.895991] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2323.903237] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2323.910487] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2323.917736] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 [ 2323.924980] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2323.932240] CPU: 0 PID: 9956 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2323.940027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2323.949368] Call Trace: [ 2323.951951] dump_stack+0x1b2/0x281 [ 2323.953338] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2323.955574] should_fail.cold+0x10a/0x149 [ 2323.955590] __alloc_pages_nodemask+0x22c/0x2720 [ 2323.955599] ? __save_stack_trace+0x63/0x160 [ 2323.955611] ? is_bpf_text_address+0x91/0x150 [ 2323.955624] ? __lock_acquire+0x5fc/0x3f20 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2323.982911] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2323.987745] ? kernel_text_address+0xbd/0xf0 [ 2323.992149] ? __kernel_text_address+0x9/0x30 [ 2323.995719] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2323.996638] ? depot_save_stack+0x10d/0x3f0 [ 2324.006284] ? kasan_kmalloc+0x139/0x160 [ 2324.010339] cache_grow_begin+0x91/0x700 [ 2324.014391] ? fs_reclaim_release+0xd0/0x110 [ 2324.018793] ? check_preemption_disabled+0x35/0x240 [ 2324.023797] cache_alloc_refill+0x273/0x350 [ 2324.028106] kmem_cache_alloc+0x333/0x3c0 [ 2324.032237] getname_flags+0xc8/0x550 20:42:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2324.036022] user_path_at_empty+0x2a/0x50 [ 2324.040152] do_mount+0x118/0x2a30 [ 2324.043691] ? copy_mount_string+0x40/0x40 [ 2324.047915] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2324.052920] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 2324.057751] ? copy_mnt_ns+0xa30/0xa30 [ 2324.061621] ? copy_mount_options+0x1fa/0x2f0 [ 2324.066101] ? copy_mnt_ns+0xa30/0xa30 [ 2324.069982] SyS_mount+0xa8/0x120 [ 2324.073538] ? copy_mnt_ns+0xa30/0xa30 [ 2324.077417] do_syscall_64+0x1d5/0x640 [ 2324.081297] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2324.086473] RIP: 0033:0x7fd08e0895a9 [ 2324.090164] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2324.097860] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2324.105108] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2324.112359] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2324.119615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2324.126870] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2324.134138] CPU: 1 PID: 9954 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2324.141932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2324.151276] Call Trace: [ 2324.153856] dump_stack+0x1b2/0x281 [ 2324.157482] should_fail.cold+0x10a/0x149 [ 2324.161626] should_failslab+0xd6/0x130 [ 2324.165614] __kmalloc+0x2c1/0x400 [ 2324.169146] ? __list_lru_init+0x67/0x710 [ 2324.173292] __list_lru_init+0x67/0x710 [ 2324.177267] sget_userns+0x4e4/0xc10 [ 2324.180973] ? set_bdev_super+0x110/0x110 [ 2324.185117] ? ns_test_super+0x50/0x50 [ 2324.189000] ? set_bdev_super+0x110/0x110 [ 2324.193144] ? ns_test_super+0x50/0x50 [ 2324.197022] sget+0xd1/0x110 [ 2324.200038] mount_bdev+0xcd/0x360 [ 2324.203573] ? fuse_get_root_inode+0xc0/0xc0 [ 2324.205879] FAULT_INJECTION: forcing a failure. [ 2324.205879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2324.207973] mount_fs+0x92/0x2a0 [ 2324.223101] vfs_kern_mount.part.0+0x5b/0x470 [ 2324.227579] do_mount+0xe65/0x2a30 [ 2324.231100] ? lock_acquire+0x170/0x3f0 [ 2324.235053] ? lock_downgrade+0x740/0x740 [ 2324.239180] ? copy_mount_string+0x40/0x40 [ 2324.243404] ? __might_fault+0x177/0x1b0 [ 2324.247446] ? _copy_from_user+0x96/0x100 [ 2324.251574] ? copy_mount_options+0x1fa/0x2f0 [ 2324.256048] ? copy_mnt_ns+0xa30/0xa30 [ 2324.259915] SyS_mount+0xa8/0x120 [ 2324.263362] ? copy_mnt_ns+0xa30/0xa30 [ 2324.267237] do_syscall_64+0x1d5/0x640 [ 2324.271108] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2324.276278] RIP: 0033:0x7f80eb4535a9 20:42:39 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 5) [ 2324.279968] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2324.287664] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2324.294913] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2324.302164] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2324.309422] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000002 [ 2324.316673] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2324.323941] CPU: 0 PID: 9971 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2324.331732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2324.341073] Call Trace: [ 2324.343657] dump_stack+0x1b2/0x281 [ 2324.347283] should_fail.cold+0x10a/0x149 [ 2324.351429] ? debug_check_no_obj_freed+0x2c0/0x680 [ 2324.356440] __alloc_pages_nodemask+0x22c/0x2720 [ 2324.361191] ? lock_downgrade+0x740/0x740 [ 2324.365347] ? __lock_acquire+0x5fc/0x3f20 [ 2324.369584] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2324.374420] ? putname+0xcd/0x110 [ 2324.377867] ? putname+0xcd/0x110 [ 2324.381315] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2324.386330] ? kmem_cache_free+0x23a/0x2b0 [ 2324.390566] ? putname+0xcd/0x110 [ 2324.394014] ? filename_lookup+0x380/0x510 [ 2324.398254] cache_grow_begin+0x91/0x700 [ 2324.402313] ? fs_reclaim_release+0xd0/0x110 [ 2324.406709] ? check_preemption_disabled+0x35/0x240 [ 2324.411712] cache_alloc_refill+0x273/0x350 [ 2324.416020] kmem_cache_alloc+0x333/0x3c0 [ 2324.420147] getname_kernel+0x4e/0x340 [ 2324.424010] kern_path+0x1b/0x40 [ 2324.427352] do_mount+0xb78/0x2a30 [ 2324.430874] ? lock_acquire+0x170/0x3f0 [ 2324.434833] ? lock_downgrade+0x740/0x740 [ 2324.438957] ? copy_mount_string+0x40/0x40 [ 2324.443166] ? __might_fault+0x177/0x1b0 [ 2324.447204] ? _copy_from_user+0x96/0x100 [ 2324.451337] ? copy_mount_options+0x1fa/0x2f0 [ 2324.455818] ? copy_mnt_ns+0xa30/0xa30 [ 2324.459684] SyS_mount+0xa8/0x120 [ 2324.463112] ? copy_mnt_ns+0xa30/0xa30 [ 2324.466981] do_syscall_64+0x1d5/0x640 [ 2324.470857] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2324.476034] RIP: 0033:0x7fbbd38d55a9 [ 2324.479723] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:42:40 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 11) 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 6) 20:42:40 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:40 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="76e32a", @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303130303030531d63e41ac4d162cdb169ae4dba567e339cf87a9856fe737133ffd3a14d9ce6577621472b5ad94192eeaf4eb8"]) 20:42:40 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 6) [ 2324.487406] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2324.494653] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2324.501907] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2324.509152] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 [ 2324.516397] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 20:42:40 executing program 1: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2324.587348] FAULT_INJECTION: forcing a failure. [ 2324.587348] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.594914] FAULT_INJECTION: forcing a failure. [ 2324.594914] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.612019] FAULT_INJECTION: forcing a failure. [ 2324.612019] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.629871] CPU: 1 PID: 9986 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2324.637667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2324.647015] Call Trace: [ 2324.649597] dump_stack+0x1b2/0x281 [ 2324.653231] should_fail.cold+0x10a/0x149 [ 2324.657386] should_failslab+0xd6/0x130 [ 2324.661353] kmem_cache_alloc+0x28e/0x3c0 [ 2324.665488] alloc_vfsmnt+0x23/0x7f0 [ 2324.669182] ? _raw_read_unlock+0x29/0x40 [ 2324.673311] vfs_kern_mount.part.0+0x27/0x470 [ 2324.677790] do_mount+0xe65/0x2a30 [ 2324.681318] ? retint_kernel+0x2d/0x2d [ 2324.685191] ? copy_mount_string+0x40/0x40 [ 2324.689405] ? copy_mount_options+0x185/0x2f0 [ 2324.693883] ? copy_mount_options+0x14b/0x2f0 [ 2324.698369] ? copy_mount_options+0x1fa/0x2f0 [ 2324.702847] ? copy_mnt_ns+0xa30/0xa30 [ 2324.706718] SyS_mount+0xa8/0x120 [ 2324.710153] ? copy_mnt_ns+0xa30/0xa30 [ 2324.714023] do_syscall_64+0x1d5/0x640 [ 2324.717899] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2324.723074] RIP: 0033:0x7fd08e0895a9 [ 2324.726768] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2324.734458] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2324.741709] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2324.748962] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2324.756210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2324.763458] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2324.770721] CPU: 0 PID: 9988 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2324.778513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2324.787858] Call Trace: [ 2324.790435] dump_stack+0x1b2/0x281 [ 2324.794053] should_fail.cold+0x10a/0x149 [ 2324.798186] should_failslab+0xd6/0x130 [ 2324.802145] __kmalloc+0x2c1/0x400 [ 2324.805664] ? __list_lru_init+0x67/0x710 [ 2324.809799] __list_lru_init+0x67/0x710 [ 2324.813756] sget_userns+0x4e4/0xc10 [ 2324.817447] ? set_bdev_super+0x110/0x110 [ 2324.821579] ? ns_test_super+0x50/0x50 [ 2324.825453] ? set_bdev_super+0x110/0x110 [ 2324.829578] ? ns_test_super+0x50/0x50 [ 2324.833446] sget+0xd1/0x110 [ 2324.836447] mount_bdev+0xcd/0x360 [ 2324.839974] ? fuse_get_root_inode+0xc0/0xc0 [ 2324.844383] mount_fs+0x92/0x2a0 [ 2324.847741] vfs_kern_mount.part.0+0x5b/0x470 [ 2324.852228] do_mount+0xe65/0x2a30 [ 2324.855759] ? lock_acquire+0x170/0x3f0 [ 2324.859716] ? lock_downgrade+0x740/0x740 [ 2324.863846] ? copy_mount_string+0x40/0x40 [ 2324.868059] ? __might_fault+0x177/0x1b0 [ 2324.872103] ? _copy_from_user+0x96/0x100 [ 2324.876234] ? copy_mount_options+0x1fa/0x2f0 [ 2324.880714] ? copy_mnt_ns+0xa30/0xa30 [ 2324.884588] SyS_mount+0xa8/0x120 [ 2324.888021] ? copy_mnt_ns+0xa30/0xa30 [ 2324.891890] do_syscall_64+0x1d5/0x640 [ 2324.895762] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2324.900931] RIP: 0033:0x7f80eb4535a9 [ 2324.904624] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2324.912312] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2324.919561] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2324.926811] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2324.934059] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000002 [ 2324.941307] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2324.948569] CPU: 1 PID: 9992 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2324.956367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2324.965709] Call Trace: [ 2324.968290] dump_stack+0x1b2/0x281 [ 2324.971915] should_fail.cold+0x10a/0x149 [ 2324.976059] should_failslab+0xd6/0x130 [ 2324.980036] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2324.984700] get_mountpoint+0xc3/0x320 [ 2324.988589] lock_mount+0x106/0x450 [ 2324.992240] ? lookup_mnt+0x3b0/0x3b0 [ 2324.996032] ? getname_kernel+0x1fd/0x340 [ 2324.997577] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2325.000171] do_mount+0xbd2/0x2a30 [ 2325.000185] ? lock_acquire+0x170/0x3f0 [ 2325.000196] ? lock_downgrade+0x740/0x740 [ 2325.017407] ? copy_mount_string+0x40/0x40 [ 2325.021634] ? __might_fault+0x177/0x1b0 [ 2325.025692] ? _copy_from_user+0x96/0x100 [ 2325.027436] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2325.029833] ? copy_mnt_ns+0xa30/0xa30 [ 2325.029844] SyS_mount+0xa8/0x120 [ 2325.029854] ? copy_mnt_ns+0xa30/0xa30 [ 2325.046372] do_syscall_64+0x1d5/0x640 [ 2325.050260] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2325.055437] RIP: 0033:0x7fbbd38d55a9 [ 2325.059137] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2325.064044] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2325.066832] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2325.066837] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x4015, 0x0) (fail_nth: 12) 20:42:40 executing program 2: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000000)='.\x00', 0x0, 0x55402, 0x0) (fail_nth: 7) 20:42:40 executing program 5: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000']) (fail_nth: 7) 20:42:40 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYBLOB="2c526f303030303030303030303830113030303000"/33]) 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x0, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.066843] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.066848] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 [ 2325.066854] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 20:42:40 executing program 3: mount$fuseblk(&(0x7f0000000080), &(0x7f0000000040)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRESHEX, @ANYBLOB="2c526f303030303030303030303830113030303000"/33]) [ 2325.155575] FAULT_INJECTION: forcing a failure. [ 2325.155575] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.165904] FAULT_INJECTION: forcing a failure. [ 2325.165904] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.186020] CPU: 0 PID: 10015 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2325.188127] FAULT_INJECTION: forcing a failure. [ 2325.188127] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.193909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2325.193916] Call Trace: [ 2325.193931] dump_stack+0x1b2/0x281 [ 2325.193947] should_fail.cold+0x10a/0x149 [ 2325.193961] should_failslab+0xd6/0x130 [ 2325.193974] __kmalloc+0x2c1/0x400 [ 2325.193983] ? register_shrinker+0x1ab/0x220 [ 2325.193995] register_shrinker+0x1ab/0x220 [ 2325.194004] sget_userns+0x9aa/0xc10 [ 2325.194018] ? set_bdev_super+0x110/0x110 [ 2325.248713] ? ns_test_super+0x50/0x50 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x0, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) 20:42:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x0, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.252594] ? set_bdev_super+0x110/0x110 [ 2325.256725] ? ns_test_super+0x50/0x50 [ 2325.260609] sget+0xd1/0x110 [ 2325.263627] mount_bdev+0xcd/0x360 [ 2325.267165] ? fuse_get_root_inode+0xc0/0xc0 [ 2325.271586] mount_fs+0x92/0x2a0 [ 2325.274949] vfs_kern_mount.part.0+0x5b/0x470 [ 2325.279434] do_mount+0xe65/0x2a30 [ 2325.282963] ? lock_acquire+0x170/0x3f0 [ 2325.286923] ? lock_downgrade+0x740/0x740 [ 2325.291062] ? copy_mount_string+0x40/0x40 [ 2325.295291] ? __might_fault+0x177/0x1b0 [ 2325.299349] ? _copy_from_user+0x96/0x100 20:42:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={&(0x7f00000004c0), 0xc, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x0, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.303486] ? copy_mount_options+0x1fa/0x2f0 [ 2325.307966] ? copy_mnt_ns+0xa30/0xa30 [ 2325.311839] SyS_mount+0xa8/0x120 [ 2325.315279] ? copy_mnt_ns+0xa30/0xa30 [ 2325.319157] do_syscall_64+0x1d5/0x640 [ 2325.323047] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2325.328227] RIP: 0033:0x7f80eb4535a9 [ 2325.331928] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2325.339624] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2325.346875] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2325.354124] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.361375] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000002 [ 2325.368628] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2325.375889] CPU: 1 PID: 10016 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 2325.383772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2325.393112] Call Trace: [ 2325.395692] dump_stack+0x1b2/0x281 [ 2325.399320] should_fail.cold+0x10a/0x149 [ 2325.403466] should_failslab+0xd6/0x130 [ 2325.406094] ------------[ cut here ]------------ [ 2325.407464] kmem_cache_alloc+0x28e/0x3c0 [ 2325.412204] WARNING: CPU: 0 PID: 10015 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 2325.416320] alloc_vfsmnt+0x23/0x7f0 [ 2325.424167] Kernel panic - not syncing: panic_on_warn set ... [ 2325.424167] [ 2325.427861] clone_mnt+0x6c/0xff0 [ 2325.438618] ? kfree+0x1f0/0x250 [ 2325.441970] copy_tree+0xd6/0xa20 [ 2325.445413] do_mount+0x1cd3/0x2a30 [ 2325.449020] ? lock_acquire+0x170/0x3f0 [ 2325.452974] ? lock_downgrade+0x740/0x740 [ 2325.457103] ? copy_mount_string+0x40/0x40 [ 2325.461315] ? __might_fault+0x177/0x1b0 [ 2325.465357] ? _copy_from_user+0x96/0x100 [ 2325.469486] ? copy_mnt_ns+0xa30/0xa30 [ 2325.473354] SyS_mount+0xa8/0x120 [ 2325.476789] ? copy_mnt_ns+0xa30/0xa30 [ 2325.480668] do_syscall_64+0x1d5/0x640 [ 2325.484544] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2325.489713] RIP: 0033:0x7fbbd38d55a9 [ 2325.493403] RSP: 002b:00007fbbd2249168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2325.501091] RAX: ffffffffffffffda RBX: 00007fbbd39f6f80 RCX: 00007fbbd38d55a9 [ 2325.508341] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000020000080 [ 2325.515936] RBP: 00007fbbd22491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.523190] R10: 0000000000055402 R11: 0000000000000246 R12: 0000000000000001 [ 2325.530437] R13: 00007fff86dbe01f R14: 00007fbbd2249300 R15: 0000000000022000 [ 2325.537699] CPU: 0 PID: 10015 Comm: syz-executor.4 Not tainted 4.14.295-syzkaller #0 [ 2325.545569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2325.554908] Call Trace: 20:42:41 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.557497] dump_stack+0x1b2/0x281 [ 2325.561124] panic+0x1f9/0x42d [ 2325.564310] ? add_taint.cold+0x16/0x16 [ 2325.568277] ? kill_block_super+0xbe/0xe0 [ 2325.572411] ? __warn.cold+0x5/0x44 [ 2325.576037] ? kill_block_super+0xbe/0xe0 [ 2325.580179] __warn.cold+0x20/0x44 [ 2325.583715] ? ist_end_non_atomic+0x10/0x10 [ 2325.588026] ? kill_block_super+0xbe/0xe0 [ 2325.592163] report_bug+0x208/0x250 [ 2325.595787] do_error_trap+0x195/0x2d0 [ 2325.599664] ? math_error+0x2d0/0x2d0 [ 2325.603453] ? retint_kernel+0x2d/0x2d [ 2325.607330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2325.612158] invalid_op+0x1b/0x40 [ 2325.615599] RIP: 0010:kill_block_super+0xbe/0xe0 [ 2325.620338] RSP: 0018:ffff88809676fbc8 EFLAGS: 00010246 [ 2325.625685] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90009dd3000 [ 2325.632941] RDX: 0000000000040000 RSI: ffffffff8187637e RDI: ffff8880a5c5cc30 [ 2325.640192] RBP: ffff8880a2cd2c40 R08: ffffffff8b9b1248 R09: 0000000000000001 [ 2325.647445] R10: 0000000000000000 R11: ffff8880b05a2040 R12: ffff8880a5c5c780 20:42:41 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.654692] R13: ffffffff891ea510 R14: ffffffff88f45820 R15: dffffc0000000000 [ 2325.661958] ? kill_block_super+0xbe/0xe0 [ 2325.665141] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 2325.666096] ? kill_block_super+0xbe/0xe0 [ 2325.675574] deactivate_locked_super+0x6c/0xd0 [ 2325.680143] sget_userns+0x9c4/0xc10 [ 2325.683845] ? set_bdev_super+0x110/0x110 [ 2325.687988] ? ns_test_super+0x50/0x50 [ 2325.691867] ? set_bdev_super+0x110/0x110 [ 2325.696004] ? ns_test_super+0x50/0x50 [ 2325.699878] sget+0xd1/0x110 [ 2325.702888] mount_bdev+0xcd/0x360 [ 2325.706414] ? fuse_get_root_inode+0xc0/0xc0 [ 2325.710800] mount_fs+0x92/0x2a0 [ 2325.714153] vfs_kern_mount.part.0+0x5b/0x470 [ 2325.718631] do_mount+0xe65/0x2a30 [ 2325.722161] ? lock_acquire+0x170/0x3f0 [ 2325.726117] ? lock_downgrade+0x740/0x740 [ 2325.730249] ? copy_mount_string+0x40/0x40 [ 2325.734469] ? __might_fault+0x177/0x1b0 [ 2325.738522] ? _copy_from_user+0x96/0x100 [ 2325.742658] ? copy_mount_options+0x1fa/0x2f0 [ 2325.747147] ? copy_mnt_ns+0xa30/0xa30 [ 2325.751024] SyS_mount+0xa8/0x120 [ 2325.754460] ? copy_mnt_ns+0xa30/0xa30 20:42:41 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@bridge_dellink={0x27c, 0x11, 0x1, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x800, 0x40000}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0xfc}, @IFLA_EXT_MASK={0x8, 0x1d, 0x9}, @IFLA_VFINFO_LIST={0x17c, 0x16, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0x3, 0xfb56}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x0, 0x260}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x7}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8000, 0xdc5f}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x9, 0x1}}]}, {0xf8, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x9da}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x2}}, @IFLA_VF_VLAN_LIST={0xb8, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0xfbd}}, {0x14, 0x1, {0x4, 0x224, 0x9, 0x88a8}}, {0x14, 0x1, {0x8, 0xa65, 0x6, 0x8100}}, {0x14, 0x1, {0x9, 0xfa0, 0x1ff, 0x8100}}, {0x14, 0x1, {0x46b31d88, 0x9f9, 0x6, 0x8100}}, {0x14, 0x1, {0x374d, 0x2bf, 0x80, 0x88a8}}, {0x14, 0x1, {0x40, 0x2c0, 0x1, 0x8100}}, {0x14, 0x1, {0xd9, 0x550, 0x5, 0x88a8}}, {0x14, 0x1, {0x400, 0xbb, 0x34a, 0x8100}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x3, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x3, 0x6, 0x1}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xf38e, @remote}}]}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x81}, @IFLA_VF_PORTS={0x38, 0x18, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4caf1d1d202acfde92674ab562cfecf6"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2dcece030196a35193f083f8bfea605f"}]}]}, @IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'pimreg0\x00'}]}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x9faf}, @IFLA_PORT_SELF={0x5c, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b52b3766ccf0cd865a359411df747f43"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "cbf36191768805f0554ae834ef63ca01"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ede5810b22067f6a4dbf41da014a469a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a26e6ad00ae632086ae198add2ccc2e5"}, @IFLA_PORT_VF={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xb, 0x24, "24cf55528f0b90"}]}, 0x27c}, 0x1, 0x0, 0x0, 0xd5}, 0x800) [ 2325.758337] do_syscall_64+0x1d5/0x640 [ 2325.762222] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2325.767400] RIP: 0033:0x7f80eb4535a9 [ 2325.771101] RSP: 002b:00007f80e9dc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2325.778810] RAX: ffffffffffffffda RBX: 00007f80eb574f80 RCX: 00007f80eb4535a9 [ 2325.786072] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000000 [ 2325.793325] RBP: 00007f80e9dc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2325.800580] R10: 0000000000004015 R11: 0000000000000246 R12: 0000000000000002 [ 2325.807841] R13: 00007fff474d90af R14: 00007f80e9dc7300 R15: 0000000000022000 [ 2325.815457] CPU: 1 PID: 10017 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 2325.823333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 2325.832669] Call Trace: [ 2325.835241] dump_stack+0x1b2/0x281 [ 2325.838854] should_fail.cold+0x10a/0x149 [ 2325.842990] should_failslab+0xd6/0x130 [ 2325.846953] __kmalloc_track_caller+0x2bc/0x400 [ 2325.851605] ? kstrdup_const+0x35/0x60 [ 2325.855476] ? lock_downgrade+0x740/0x740 [ 2325.859612] kstrdup+0x36/0x70 [ 2325.862790] kstrdup_const+0x35/0x60 [ 2325.866488] alloc_vfsmnt+0xe0/0x7f0 [ 2325.870184] ? _raw_read_unlock+0x29/0x40 [ 2325.874316] vfs_kern_mount.part.0+0x27/0x470 [ 2325.878798] do_mount+0xe65/0x2a30 [ 2325.882328] ? copy_mount_string+0x40/0x40 [ 2325.886551] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2325.891552] ? copy_mnt_ns+0xa30/0xa30 [ 2325.895424] ? copy_mount_options+0x1fa/0x2f0 [ 2325.899903] ? copy_mnt_ns+0xa30/0xa30 [ 2325.903774] SyS_mount+0xa8/0x120 [ 2325.907214] ? copy_mnt_ns+0xa30/0xa30 [ 2325.911084] do_syscall_64+0x1d5/0x640 [ 2325.914961] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2325.920133] RIP: 0033:0x7fd08e0895a9 [ 2325.923829] RSP: 002b:00007fd08c9fd168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2325.931535] RAX: ffffffffffffffda RBX: 00007fd08e1aaf80 RCX: 00007fd08e0895a9 [ 2325.938793] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 2325.946162] RBP: 00007fd08c9fd1d0 R08: 00000000200001c0 R09: 0000000000000000 [ 2325.953421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2325.960675] R13: 00007ffe16f5629f R14: 00007fd08c9fd300 R15: 0000000000022000 [ 2325.968008] Kernel Offset: disabled [ 2325.971697] Rebooting in 86400 seconds..