0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/218], 0x1, 0x0, 0x0) msgrcv(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000000400"/33], 0x1, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000580)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) msgctl$IPC_RMID(r1, 0x0) msgrcv(r1, &(0x7f0000000140)={0x0, ""/131}, 0x8b, 0x0, 0x0) 18:22:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) mmap(&(0x7f0000464000/0x3000)=nil, 0x3000, 0x2, 0x8010, r2, 0x3ae71000) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x80000000, 'none\x00'}, 0x2c) [ 650.418398][T25319] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 650.433808][T25320] fuse: Bad value for 'fd' [ 650.455759][T25331] fuse: Bad value for 'fd' 18:22:29 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000240)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x11, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r4, @in6={{0xa, 0x4e22, 0x3, @empty, 0x10001}}}, &(0x7f0000000000)=0x84) select(0x40, &(0x7f0000000280)={0x4, 0x3f, 0x6, 0xff, 0x7, 0x100000000, 0x8e2, 0x3f}, &(0x7f00000002c0)={0x80000001, 0x8001, 0xffffffffffff7fa7, 0x7fffffff, 0x3f, 0x2, 0x155, 0x4cdc}, &(0x7f0000000300)={0x4, 0x9, 0x0, 0x4, 0x3, 0xfff, 0xfd4, 0x40004000}, &(0x7f0000000340)={0x0, 0xea60}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socket$caif_seqpacket(0x25, 0x5, 0x2) [ 650.594606][T25274] IPVS: ftp: loaded support on port[0] = 21 [ 650.655134][T25354] fuse: Bad value for 'fd' [ 650.750896][T25354] fuse: Bad value for 'fd' 18:22:32 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:32 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x3f4, 0x0, 0x10001}, 0x455, 0x21d3, 'id0\x00', 'timer1\x00', 0x0, 0xfffffffffffffffc, 0x5, 0x7f}) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0xffffffffffffffa3}], 0x4, 0x2) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4) ptrace$cont(0x18, r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x1) mkdirat$cgroup(r4, &(0x7f0000000040)='syz1\x00', 0x1ff) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000002c0)="606f381e8d28498c46491cd3917b0b9b1833287309fb7099f9cbab78168c4ef02087eb49ea223f75bde1e291fa934cff9233ac434a55ef5d3f3ccb89d7f3e2da7590120cd96ec4ca7e42b4c1419b539655f8a372c2a54f8da023360fdbce9a8c5932b99daefd9e31f202bde967933d7d4076c35c7bdbd058d1155e364745ae1844b5ea8459e8a5190178da346e7e555f41cc35b76779126391ab271bc32e86b223273921de8a3eda8f6a39fb873746b7e95b44387a15a2d7ad1caa110648c39d7d161cba4d87") ptrace$cont(0x9, r2, 0x0, 0x0) 18:22:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/48, 0x30}, {&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000080)=""/160, 0xa0}, {&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/169, 0xa9}], 0x5, &(0x7f0000000480)=""/90, 0x5a}}, {{&(0x7f0000000500)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000000580)=""/2, 0x2}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/66, 0x42}, {&(0x7f00000006c0)=""/106, 0x6a}], 0x4, &(0x7f0000000780)=""/77, 0x4d}, 0x4}, {{&(0x7f0000000800)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000880)=""/33, 0x21}, {&(0x7f00000008c0)=""/43, 0x2b}, {&(0x7f0000000900)=""/161, 0xa1}, {&(0x7f00000009c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001a00)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000002a00)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/79, 0x4f}], 0x1, &(0x7f0000002b40)=""/146, 0x92}, 0x1}, {{&(0x7f0000002c00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002c80)=""/146, 0x92}, {&(0x7f0000002d40)=""/54, 0x36}, {&(0x7f0000002d80)=""/176, 0xb0}, {&(0x7f0000002e40)=""/106, 0x6a}, {&(0x7f0000002ec0)=""/141, 0x8d}], 0x5, &(0x7f0000003000)=""/15, 0xf}, 0x8}, {{&(0x7f0000003040)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003300)=[{&(0x7f00000030c0)=""/193, 0xc1}, {&(0x7f00000031c0)=""/179, 0xb3}, {&(0x7f0000003280)=""/108, 0x6c}], 0x3}, 0x4}, {{&(0x7f0000003340)=@ax25={{}, [@netrom, @remote, @null, @remote, @rose, @rose, @bcast, @default]}, 0x80, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/49, 0x31}, {&(0x7f0000003400)=""/115, 0x73}], 0x2, &(0x7f00000034c0)=""/126, 0x7e}, 0x8}], 0x7, 0x40000020, &(0x7f0000003700)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r5, 0x4008af22, &(0x7f0000003740)={0x1, r7}) mmap(&(0x7f0000636000/0x4000)=nil, 0x4000, 0x1000002, 0x80010, r3, 0x547fd000) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000000)=0x53) r8 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000240)={0x8, 0x0, [{0x0, 0x1, 0x1, 0x3, 0x6, 0x7fff, 0xe7}, {0xb, 0x7c7cd30b, 0x6, 0x4, 0x6, 0x5, 0x1}, {0x0, 0x1000, 0x4, 0x81, 0xfffffbff, 0x6, 0x7f}, {0x6, 0x1, 0x3, 0x8, 0x9, 0x6, 0xfffffffb}, {0xb, 0x8, 0x2, 0x5, 0x3, 0x2, 0x10001}, {0x80000008, 0x8f, 0x0, 0x5, 0x1, 0x1, 0x5}, {0x1, 0x2, 0x6, 0x8, 0x7fff, 0xffff, 0x5}, {0x7, 0x3, 0x7, 0xfffffffe, 0xffffa075, 0xfff, 0x71}]}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:32 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:32 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) wait4(r1, 0x0, 0x80000000, &(0x7f0000000100)) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) r3 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r3], 0x1}, 0x50) ptrace$cont(0x18, r3, 0x8000, 0xfffffffffffffffd) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0xfffffffffffffffe, 0x7, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x93f4, 0x0, 0x0, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r5, 0x301, &(0x7f00000001c0)) ptrace$cont(0x9, r2, 0xfffffffffffffffe, 0xfffffffffffffffd) [ 653.249960][T25403] IPVS: ftp: loaded support on port[0] = 21 18:22:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x24}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x48, r4, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x827}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 653.295767][T25409] IPVS: ftp: loaded support on port[0] = 21 18:22:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_pts(r1, 0x200) write$smackfs_access(r1, &(0x7f0000000000)={'', 0x20, 'em0', 0x20, 'rtl'}, 0x9) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000400)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @local, 0xffff}, @in6={0xa, 0x4e23, 0x4, @local, 0x101}}}, 0x118) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f747eb641346d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r6 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r7, 0x0) ioprio_set$uid(0x0, r7, 0x4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:32 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x81, 0xea6, 0x8}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00', 0x16}, 0x2c) 18:22:32 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = getpgrp(0x0) ptrace$cont(0x9, r2, 0x9, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) [ 653.473223][T25442] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 653.525743][T25439] fuse: Unknown parameter 'root~¶A4mode' [ 653.525773][T25460] ptrace attach of "/root/syz-executor.1"[25454] was attempted by "/root/syz-executor.1"[25460] [ 653.549599][T25461] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 653.566416][T25453] fuse: Unknown parameter '0000000000000000000618446744073709551615' 18:22:32 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x1000000000000000, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7, 0x4}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 653.581213][T25439] fuse: Unknown parameter 'root~¶A4mode' [ 653.595458][T25453] fuse: Unknown parameter '0000000000000000000618446744073709551615' [ 653.761933][T25485] ptrace attach of "/root/syz-executor.1"[25482] was attempted by "/root/syz-executor.1"[25485] [ 653.790809][T25409] IPVS: ftp: loaded support on port[0] = 21 18:22:33 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x6, 0x0, 'none\x00'}, 0x2c) 18:22:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x202000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000200)={0x9d0000, 0x1, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x980911, 0x7f, [], @string=&(0x7f0000000180)=0x1}}) ioctl$RTC_IRQP_READ(r4, 0x8008700b, &(0x7f0000000240)) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={r6, 0x0, 0x2}, 0x8) r7 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 18:22:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000000)={0x1, 0x4, 0xfffc, @multicast, 'wg2\x00'}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r3, 0x1, 0x0, 0x0, {0x1a}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14}]}, 0x30}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f00)=[{{&(0x7f0000000140)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/118, 0x76}, {&(0x7f00000002c0)=""/227, 0xe3}, {&(0x7f00000000c0)=""/21, 0x15}], 0x3, &(0x7f00000003c0)=""/222, 0xde}, 0x10001}, {{&(0x7f00000004c0)=@ax25={{0x3, @null}, [@remote, @null, @bcast, @remote, @netrom, @default, @default, @null]}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000540)=""/56, 0x38}, {&(0x7f0000000580)=""/232, 0xe8}, {&(0x7f0000000680)=""/119, 0x77}, {&(0x7f0000000700)=""/100, 0x64}, {&(0x7f0000000780)=""/197, 0xc5}, {&(0x7f0000000880)=""/96, 0x60}], 0x6, &(0x7f0000000980)=""/222, 0xde}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/202, 0xca}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000000b80)=""/112, 0x70}], 0x4, &(0x7f0000000c40)=""/93, 0x5d}, 0x3}, {{&(0x7f0000000cc0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d40)=""/119, 0x77}, {&(0x7f0000000dc0)=""/135, 0x87}, {&(0x7f0000000e80)=""/28, 0x1c}], 0x3, &(0x7f0000000f00)=""/152, 0x98}}, {{&(0x7f0000000fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001040)=""/85, 0x55}, {&(0x7f00000010c0)=""/24, 0x18}, {&(0x7f0000001100)=""/62, 0x3e}, {&(0x7f0000001140)=""/166, 0xa6}, {&(0x7f0000001200)=""/119, 0x77}, {&(0x7f0000001280)=""/64, 0x40}, {&(0x7f00000012c0)=""/23, 0x17}], 0x7, &(0x7f0000001380)=""/72, 0x48}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001400)=""/254, 0xfe}, {0xffffffffffffffff}, {&(0x7f0000001500)=""/28, 0x1c}, {&(0x7f0000001540)=""/134, 0x86}, {&(0x7f0000003840)=""/4096, 0x1000}], 0x5, &(0x7f0000001680)=""/83, 0x53}, 0x1f}, {{&(0x7f0000001700)=@l2, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000004840)=""/152, 0x98}, {&(0x7f0000004900)=""/5, 0x5}, {&(0x7f0000004940)=""/173, 0xad}, {&(0x7f0000004a00)=""/127, 0x7f}, {&(0x7f0000004a80)=""/196, 0xc4}, {&(0x7f0000004b80)=""/55, 0x37}, {&(0x7f0000004bc0)=""/4096, 0x1000}], 0x7, &(0x7f0000005c40)=""/181, 0xb5}}, {{&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005e00)=[{&(0x7f0000005d80)=""/112, 0x70}], 0x1, &(0x7f0000005e40)=""/150, 0x96}, 0x6}], 0x8, 0x10100, &(0x7f0000006100)={0x77359400}) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000006200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000061c0)={&(0x7f0000006140)={0x48, r3, 0x528, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x2b}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @remote}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}]}, 0x48}, 0x1, 0x0, 0x0, 0x24040800}, 0x10000010) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f0000000080)={0x30}, 0x30) 18:22:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x6, 0x6, 0x801, 0x0, 0x0, {0xe, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 654.262845][T25525] IPVS: ftp: loaded support on port[0] = 21 18:22:33 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTATFS(r3, &(0x7f0000000100)={0x43, 0x9, 0x1, {0x80000000, 0x3, 0x7fff, 0x26b, 0x76, 0x6, 0xa74, 0x80000001, 0x7}}, 0x43) 18:22:33 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = getuid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0xffffffff, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=':}\x00'}, 0x30) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x0, r5}) 18:22:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000000)="9d73150c6997b4b8af876d10e09a0535e20b49ea291c4cafb1f4a0463c515428dc2719c82f1dd41c1fe0b584492014624da5186147a542bc40896077f791738829e76fd0de0e308117304e3a933a981d0e5fc95c6a1ed64c8a7c63c502d9fd7ce9c7", 0x62, 0x880, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x3c, @multicast1, 0x1, 0x0, 'none\x00'}, 0x2c) fcntl$dupfd(r0, 0x406, r0) 18:22:33 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 654.501471][T25567] ptrace attach of "/root/syz-executor.1"[25563] was attempted by "/root/syz-executor.1"[25567] 18:22:33 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) r4 = getuid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0xffffffff, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=':}\x00'}, 0x30) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)={0x0, r5}) [ 654.664523][T25581] ptrace attach of "/root/syz-executor.1"[25575] was attempted by "/root/syz-executor.1"[25581] 18:22:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 654.832163][T25525] IPVS: ftp: loaded support on port[0] = 21 [ 654.833095][T25590] ptrace attach of "/root/syz-executor.1"[25587] was attempted by "/root/syz-executor.1"[25590] 18:22:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getpeername$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000040)=0x6e) [ 655.038591][T25615] ptrace attach of "/root/syz-executor.1"[25612] was attempted by "/root/syz-executor.1"[25615] 18:22:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x600, 0x0, 'none\x00'}, 0x2c) 18:22:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034302c040065725f69643d000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRES32=r1]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$getsig(0x4202, r0, 0x53f, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) set_tid_address(&(0x7f0000000040)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 655.251527][T25627] IPVS: ftp: loaded support on port[0] = 21 [ 655.257103][T25630] fuse: Invalid rootmode [ 655.375136][T25635] fuse: Invalid rootmode 18:22:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0x8, 0x7, 0x6, @empty, 'virt_wifi0\x00'}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x5) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'macvlan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x10, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'nr0\x00'}}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4024056}, 0x80) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000001c0)=0xffffffff, 0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x5) ptrace$cont(0x18, r4, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x36, r4, 0x0, 0x0) [ 655.724267][T25627] IPVS: ftp: loaded support on port[0] = 21 18:22:36 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x600, 0x0, 'none\x00'}, 0x2c) 18:22:36 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}, {&(0x7f0000000100)="0e458c34c897f3dbd9954203e979d3143b64db955153cc0749077f05b28caa244d2ffec2e1601923dcd8dc519f96a02f66957a73d616ee3601d65eff1be90bcba80391b07f6de3c9a4b48fec96ef1b07458fe9fb5811a18d3d80306ba2b2f1910ba7315b29fc3993b05a629736ce92a908c47f73c526035379d7c361ce4cdefe10ede2d3d03a77b02cb513437305d616f762c11dbdfb5a4ab9d7f3dedc258935a59b40c8e6b090a7773b9f764c78", 0xae}], 0x5, 0x0) memfd_create(&(0x7f0000000040), 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xd244) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fZ=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 657.525501][T25706] IPVS: ftp: loaded support on port[0] = 21 [ 657.550704][T25709] IPVS: ftp: loaded support on port[0] = 21 18:22:36 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48c, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="94b987fb82d4bc8e5e2c726f6f746d6f64290c30ff03303004303030ff0f0000000000003034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000005) 18:22:36 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2], 0x1}, 0x50) tkill(r2, 0x3e) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 657.745161][T25735] IPVS: ftp: loaded support on port[0] = 21 [ 657.761208][T25743] fuse: Bad value for 'fd' [ 657.816140][T25758] fuse: Bad value for 'fd' 18:22:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 658.170799][T25706] IPVS: ftp: loaded support on port[0] = 21 18:22:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="59f972fceb970afffdb0c28b29838615", 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x6, 'none\x00'}, 0x2c) [ 658.454650][T25826] IPVS: ftp: loaded support on port[0] = 21 18:22:37 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:37 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x483, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 658.650270][T25848] IPVS: ftp: loaded support on port[0] = 21 18:22:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRESDEC=0x0, @ANYBLOB="3c6772f230163816e86f", @ANYRESDEC=0x0]) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 658.954632][T25826] IPVS: ftp: loaded support on port[0] = 21 [ 659.044080][T25892] fuse: Unknown parameter '0x0000000000000003' [ 659.089367][T25901] fuse: Unknown parameter '0x0000000000000003' 18:22:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRES32, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x600, 'none\x00'}, 0x2c) [ 659.284214][T25916] fuse: Bad value for 'fd' [ 659.306852][T25919] fuse: Bad value for 'fd' [ 659.309404][T25917] IPVS: ftp: loaded support on port[0] = 21 18:22:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000140)) 18:22:38 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x483, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 659.559110][T25944] IPVS: ftp: loaded support on port[0] = 21 [ 659.810618][T25917] IPVS: ftp: loaded support on port[0] = 21 18:22:39 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x483, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 660.202928][T25976] IPVS: ftp: loaded support on port[0] = 21 18:22:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) renameat2(r2, &(0x7f0000000000)='./file0/file0\x00', r4, &(0x7f00000000c0)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:40 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PIO_FONTX(r3, 0x4b6c, &(0x7f0000000540)={0x10e, 0x19, &(0x7f0000000140)="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"}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000100)={0x5000, 0x4, 0x5, 0x0, 0x80}) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x0], 0x1}, 0x50) ptrace$getenv(0x4201, 0x0, 0x9, &(0x7f0000000580)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 660.899042][T26021] ptrace attach of "/root/syz-executor.1"[26019] was attempted by "/root/syz-executor.1"[26021] 18:22:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:40 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2], 0x1}, 0x50) ptrace$cont(0xffffffffffffffff, r2, 0x4, 0x1e409e07) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:40 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c671300000000000000", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 18:22:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000500)={0x3, 0x0, 0x2, 0x6}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000540)={r3, 0xfffffffffffffc00}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) r4 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r6, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)={0x20, 0x140c, 0x300, 0x70bd2a, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x8010}, 0x20000000) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f0000000380)={{0x2, @name="42a246d624e00da1437fbde644f3f385473d297a5f3faa33c601155527639e44"}, "28ce6b42ca65b118d7b8e3ea7a8246cdc9de3c782f1fc9aac7b210bc9f394801", 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$UHID_CREATE(r8, &(0x7f0000000240)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000140)=""/90, 0x5a, 0xfffd, 0xb6, 0x40, 0x3, 0x1000}}, 0x120) [ 661.662305][T26046] fuse: Unknown parameter 'g' 18:22:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000000c0)={'HL\x00'}, &(0x7f00000001c0)=0x1e) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_NAME(0x10, &(0x7f00000002c0)=""/67) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20800, &(0x7f0000000240)=ANY=[@ANYRES16=r6, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES16=r4, @ANYRESOCT=r1, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) creat(&(0x7f0000000140)='./file0\x00', 0x48) 18:22:41 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:22:41 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6465ad30d940d4dac44dbc511eae1dc7f8b13030303030b0303730303030303030303034302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 662.417626][T26072] fuse: Bad value for 'fd' [ 662.428538][T26071] IPVS: ftp: loaded support on port[0] = 21 [ 662.437713][T26072] fuse: Bad value for 'fd' [ 662.443073][T26073] fuse: Bad value for 'group_id' 18:22:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030ff03000030303030303061fcdd8a1654a85d5904fd530930303030303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) userfaultfd(0x80000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 662.465215][T26079] fuse: Bad value for 'group_id' 18:22:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_LSEEK(r2, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x2, {0x8}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 662.589506][T26102] fuse: Bad value for 'rootmode' [ 662.611324][T26104] fuse: Bad value for 'rootmode' 18:22:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4609a86670c2", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 662.744301][T26112] fuse: Unknown parameter 'F ¨fpÂ0x0000000000000003' [ 662.784414][T26117] fuse: Unknown parameter 'F ¨fpÂ0x0000000000000003' [ 662.794788][T26071] IPVS: ftp: loaded support on port[0] = 21 [ 663.127241][ T0] NOHZ: local_softirq_pending 08 [ 663.132274][ T0] NOHZ: local_softirq_pending 08 18:22:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='&dD', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f302f02303030303030303034472c757365725f5e69643d", @ANYRESDEC=0x0, @ANYBLOB="00000000000000000000eb0a66ef56b145fe300205d2e01546f99e7b7f30a7fbe850a62f881fdb11991a0932e4cd382e85983bc512e59f0027deca1c41954406446f43a89965207afa4bcddf90671e6166fca57b9891d9412b5c4ed5229b88b7b31051", @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0xfffffffffffffff3}, 0x30) [ 664.068157][T26144] fuse: Unknown parameter '&dD0x0000000000000003' [ 664.088253][T26147] fuse: Unknown parameter '&dD0x0000000000000003' 18:22:43 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000240)=""/191) 18:22:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x6000000, 'none\x00'}, 0x2c) 18:22:43 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) socket(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x7}}}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x3) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="75705f69643d0000ff00", @ANYRESDEC=0x0]) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x7864c89c7ecb7025, 0x3, {0x6}}, 0x18) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 664.679901][T26160] ptrace attach of "/root/syz-executor.1"[26157] was attempted by "/root/syz-executor.1"[26160] [ 664.697380][T26161] fuse: Bad value for 'user_id' [ 664.721792][T26162] IPVS: ftp: loaded support on port[0] = 21 [ 664.731468][T26165] fuse: Bad value for 'user_id' [ 664.953969][T26162] IPVS: ftp: loaded support on port[0] = 21 18:22:44 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:44 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x40230500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000140)="95255f1524244e00000000") ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f0000000100)=0x100000001) 18:22:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r5 = socket(0x1d, 0x800000003, 0x9) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="0103000000007b0c15f9ffff6104000000c358ec00", @ANYRES32=r6, @ANYBLOB], 0x1c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000038172cc8900c884d21ba81168607d54ebadf1e9a9ac77cb4e360cb80", @ANYRES16=r8, @ANYBLOB="010300000000000000000e00000008000300", @ANYRES32=r10, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000f26bd7000fddbdf250400000005002a000100000008003a00ffff000008000600", @ANYRES32=r10, @ANYBLOB="05002a000100000098ce04f0b2cfd579050037000100000008003c0002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:44 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="e8", @ANYRESDEC=0x0]) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "003d7aad4d35e26f87e55e6d5d549c98"}, 0x11, 0x1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:44 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2d) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 665.541141][T26226] IPVS: ftp: loaded support on port[0] = 21 18:22:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9a) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000000)=0x400000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 665.633439][T26245] ptrace attach of "/root/syz-executor.1"[26240] was attempted by "/root/syz-executor.1"[26245] [ 665.644913][T26241] fuse: Bad value for 'user_id' [ 665.694084][T26250] fuse: Bad value for 'user_id' [ 665.890995][T26226] IPVS: ftp: loaded support on port[0] = 21 18:22:46 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:46 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$rose(r3, 0x104, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000280)={0xfffff800, 0x1, {0x0, 0x0, 0x6}, 0xea}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x10b000, 0x8) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000140)={0x0, "6f35cf182732a85d902eb36bc3c009efcd3f3e41966150818058092a4675d2d138ffeb77d4de745cd242472362e664b61839105270d8cbaaa6f7981052edffa0", {0xffffffff, 0x400}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="000004", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:46 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x6}, 0x2c) [ 667.763170][T26317] ptrace attach of "/root/syz-executor.1"[26311] was attempted by "/root/syz-executor.1"[26317] [ 667.775078][T26310] IPVS: ftp: loaded support on port[0] = 21 [ 668.021278][T26310] IPVS: ftp: loaded support on port[0] = 21 18:22:47 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000240)="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") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc028aa03, &(0x7f0000000000)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72996f6f746d6f64653d3030050000000000000030301b28206759f9a3191afdc2b6fde848d8a1302c7c7365725f6964", @ANYRESDEC=0x0, @ANYBLOB='id=\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:47 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x6) 18:22:47 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x600}, 0x2c) [ 668.590420][T26381] IPVS: ftp: loaded support on port[0] = 21 [ 668.674861][T26385] fuse: Unknown parameter 'r™ootmode' 18:22:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x9, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='f$=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 668.737450][T26406] fuse: Unknown parameter 'r™ootmode' 18:22:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff9, 0x244200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat(r1, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 668.844187][T26428] fuse: Unknown parameter 'f$' [ 668.866856][T26428] fuse: Unknown parameter 'f$' [ 669.003753][T26381] IPVS: ftp: loaded support on port[0] = 21 18:22:50 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) ioperm(0x9, 0x8, 0x10001) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="55ebee92e0236069dd895becda3ddb53407c53bf13d09802f2aba3d2a9ecea39a410bcb3dbb3e3d77a6766b7fd7068a6a978ca3756e4122ccf6cae67e849d06f3b1814ab9c3d5734f626b31c33ef1c119de66bd6ffec76ba49b7797d296dfe26c505528ecf45db61ce7b3f2b79680b76b0d8654946", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x1000000}, 0x2c) 18:22:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000000)) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000240)="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") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 670.739438][T26471] fuse: Unknown parameter 'Uëî’à#`i݉[ìÚ' [ 670.748617][T26471] fuse: Unknown parameter 'Uëî’à#`i݉[ìÚ' [ 670.813967][T26476] IPVS: ftp: loaded support on port[0] = 21 [ 671.104617][T26476] IPVS: ftp: loaded support on port[0] = 21 18:22:50 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000240)="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") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 18:22:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x6000000}, 0x2c) 18:22:50 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x8, 0xee01, 0x0, 0x8007}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6685cfa4d6d0b833921e355d64e6aeda5ca345c872d65d0afa8f23ea0fa7a6a313c02d28b75b31ab6fff9a58c26a69af2d730085abe99be17d1669d7f372ac83f7486260aeb805fc360765bfa14d57d174fe8192cbca0b2618ca747235d209072cab5327ed6e8bb53c147aa229df79296ef23a1ce58e23922c1110553b351d94d30d6cf9d7c5b4b96f9f792eb82e33cc22539e5cf8a73b6ab528d89da6d855400be509598d88b61ca5cc4a634de2958d3c4bf566b1ea46e34e71f514df2813f085227557e59f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 671.701485][T26551] fuse: Unknown parameter 'f…ϤÖи3’5]dæ®Ú\£EÈrÖ] [ 671.701485][T26551] ú#ꧦ£À-(·[1«oÿšXÂji¯-s' [ 671.707299][T26552] IPVS: ftp: loaded support on port[0] = 21 [ 671.723354][T26559] fuse: Unknown parameter 'f…ϤÖи3’5]dæ®Ú\£EÈrÖ] [ 671.723354][T26559] ú#ꧦ£À-(·[1«oÿšXÂji¯-s' 18:22:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x8000, 0x2, {0xffffffffffffffff, 0x1, 0x6, 0x1, 0x40}, 0x7fff}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0xb, "b48e8085cf1c1ffe96dd5ce37565fec55c"}, 0x13, 0x2) [ 671.764341][T26563] ptrace attach of "/root/syz-executor.1"[26556] was attempted by "/root/syz-executor.1"[26563] 18:22:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000240)="9f068d40d3249057c21372c52f846e2eefddf11ab578a07203dd4c710ca33ec0df72ff76bf95ee4a88f8fd9f070a0c1a8b82f4183bfca42e3b589ca287c147433e1f9bba624cd2025d806121f81ea5e43c95d95ccc97fbd67df13f6d58959c6444a42c341be5093e0cabd9b4bacab9688d66f9d80cb57532e190d28e7cfbeeddb135947db89d230d15dbdc95f1d5ab7e709765496d19ab4a5ba8b94010797a45b50cb01c8475334d861222690de890cba3beb05ac4c91c373cf9859bf37e4e5d62cb908b456849ba046708f2d80bbf81bbbdf518dd7e012b92492c774d8c4f4ba8c2f73a693bdb6253a2cd58e1175735085aca2c7deb0caac3deac5bb0ab2599e2a07112027b62130b9d24628ff75fbceaa1a11fa5ff9035663a098554f38ac0fe20f348e117cfc66750d27f213ccbb1210592851474b64b4057d8a260ec6711c684a1eeab281d0dc7983bd3a48654db42adea896cd065d087db9c5c988185d8a4bfeee3f1bd3f792dd319251f949fe71097d8ca5f6e1b9abce8af56dee187f9d035b842b101ef2a04b29910898de459774d20a8c29313b2b0fe33058a2fa14014442c935f6ea4859e2ef13f2156d254a588a663ce6fbf9cb9a63531b82e1ca69ae6fd629fa764a440cd3076f07682bdf1a2f638729ff143362847773d9cda298173cfc9adda2b48e1448d7fefaf3d66252aa3af5c4cd9fd4f40580937f60b1c34b16d5d85747e3609eee6a0b4c93e7a05c0c02d660d484117109a0ac29334aaf107b0376a98369901788925295f6ad4e8f6d8d25181ffd6ebf90418c29ba673c55c85dcee15991e1b726ec7a9e5dc72755f8ad88c5856c3c194bfd102db85f3e1cfedbeadfc2828e3faa0cce107af75b595d9a35b922f42567a4425c85d557e5a0f0e985f4db8a392ba87b660ebfb127bc54ef33f55302b83a15520d1d1d12278130783f495957032111f2c243013ded5eea1f92a5a452276de9c4ad4bdbb17f9d1bdc148d8aecb47925aeffc7196a90c93be0a1715d94534125bac71df5333f2851faed596ad061f13be384de81a4bc0e6bd3ce2582587f09a849ef869f5f372d647282590995f1072a966f1c8c1aedbe40c3127a2abba2f8e89d91e0227a045964c0696b0c74ca8200373158214ef67e6208eb66bc3c9e32defd7b278ab1397df30420d2ce35278b951e62f1ad0aecd8f8802c7fabf5dfcc8cd1e72ce7ebe12e7728d54ef6b6160e6f74fc96198709583ef93bd3e318f63ed80f4c06cc7ad96a9debbba2a58979329fa6662940e7784ec95230c1598f9fb6b5ce8a3c8fcc2971db3f91b5c62f7c3be74f9a626ad13cf639c735359651d4bcf6eb8ada908b79dc3d192b669d472f58f03bbdf73a5cbaed19c1c3064726bb3f7e939d1836b67dfc4d66f0c073fdef8cd23e53a5638ca80132de142e8485d0553184967ee292f8fed791cab87dec3b6e2daa5f4cbbe9a7c19391698e42c520546a462940d6e5b95d947abd88b46eb885f057a4fa0bf18433bcebfa687f4fe75ef97400ff0ab956336b0cd68e2b3a50d70acdf86efded13d3a8f8d8ee62a3393d0c289dd3b3704603aed0e774630c84be26881e8b048847fd214d89a9c308372fbf0bae2fd0b8a7845bb592cf4d73307ec12a9542a40b0a36f7b303cba0143909841bc010807d4d30ac88338a634b36b693205cd7f3a722222f54052721f248c839076d52c198ee3bd214a707c824918ec9c50c05c1fbe4d77662d24e6ac2aed3ab5cc1834f2ffdbbd6afc69e90805253bae4a24cd96e62c2db816c43c32c37f4dedf4b70b79b1de88962177d8597b6f25803c797bccfe1d30e6a477f0a954a1522dae63afe2b86c39db82ee47b074e56036a1d42ab77aef53e45ec1b2d07afee40c7659a3d4b29d62eaa355538d13113428e429293b6c7c207393268d6aa440920ea5497be251a78563b41d28453ba63c37b3529eea12e96c6c14b022015f57d5bc86830f518e1accd9aa8961e9d8a3756e053df7ed737198d471c4f0bdba60f7c3c422ff3dd78fd4b2895d200d79fce27f71d7d2b7d4635c0d907df803307b3888a5d34b3e4c5994af492fbdd3800a84d35ad86d9daf12d251df88a20be53698e15cbc880ab5672c3221577c7d4054e7a0186027ac77ec70e0771202e2037081235112208f2d04e027d4722734f681f447941a641f49147afbea7bdcf5a54bdddd2de6813269c1efc39c0e4b639fe4a40d0d22087a918a09550ce661b2636cce9907243f92963fc6c2f0660090c84821ca46cd926d55c5cb442c8c9eb193672a7d8fd35259cb59f63c1f1a045020871a38037107165e6be19bfb984a7a4b814a9ecbc1c1fa7fec3118459ff60e89bf5c500c27432794cae88c80317d5f5ec83bb67df6e98d50aa21663c547895cb2b0dd64ab300d17b121e61416f8854a04abf6c5cac0ed7180f506a84d6aec14f13e4b970561cd0be1f6e6d49e56041457bfa3fb658e3f715f4cd2b7dd360d513d148413587fc38ad25e35c6fdb58c00ed996a4a22167fc7f81b5f4191d47b64e6da387f0d14c93b250f9207946924bc17a126b1cc034f3020636c46c66fd250d92e72d9e8a063f80e1281ce883ba7650d9997126421408554ef406bff5ef66d89e1a18bed4bb26bec4f8dc872d98c30f163616815246434cdd5cedbb04e61920b8e767f60a9f5176fc409bb40fc359f272b5c99bb253bf839847638a4349bf5fabb7eb73f6783be9d2d08fd9f770710c6ecbd3a9affbf6c5f7b48ce1d4bf917193f020dfa7325509711eb48ccabe1dd65e3ab21fc59652790076d37f69b5c3fbdd8173bffa9721c1857c651aa6d70e1824d06a3d80a7abea8bf818f6abce38e5baea007cad455768adc83ff06d911b350a950c6435c5d4c882d76cb990e9d2bdf158087b74d83c5fdb8f45721221773286f6485b3c1099ec46ff435037191356454d6d43895de305d458154d0e72e35ba67343ea2694bba7ac1449746500fbcb387ab2d14eee8cf4c52f6b18c2d8f3d75ac26c2bdf64e82a9eeccc4eae618f45045dca30e5718f58c6d9466998fa8c64fe96154d783d091266c0dda9ff73633d9780c2eba42ce5498cee534aebf5ac2b2e45bf10b2880f7baf95c0f6da8739ba2d3812a03b1d51bb903ce1197f8553f89b1080f33200fdaf00ae3dce901bdfa4f1963d2327dcf5be5a9c726ccae40044457c4c3480f5160df29ec10411b461cd7574dc9280a73c75d317784a740a2d01207067f7653a96018913059368035d4743e1dfc0640740e7e7e318dc42e5891d7c5eb5b58a4cf14cb045131b20d3708b1640679e770dcfb85ab34828b0795f8e518504c5278173d8d200d6e9aee385b4a4e8a9cae75e42e08a098325cd250fd461dc1cd3394a6d0da9ba4889607826607ae1b23e7872163824be6513e1fa2209586f798b65d974968e8b45ad67be081e4b2b349f53b7beea3b82a8606476c43cd708a60400ac82343e92ad483a51ce4b46470493cbd846d3748c1ded8f9e974ff043b965e67f692e187ef8e50099a60be002078b938377faef9b624d92ea0d515aba31f077e75f8d05be26b5b58944acfc31ef43adbbdee9dd8278b87583c1cf99481e8c8d766d332960f94d0a057cc0f240500f29bb44071f3ea0cf5285dabb81f500a557b780415eba63819105e0669fef1db04cab0d76c81560baf32eec955b807de74623f85ab073aaf3f7e95e1a785201b10a7ee921a111f0447ac919904ab14cdf8fbb26c4b7f6c3140e9fe3002d695791ab75a9499cef2c5aaad7aaad57c23cef4e115e5d38670f9d2df4516857c5b203e948de48eea4d9531f4a1aae918f165a330f5e6afe85f60d615f41fcb689d9f5f28ca14863a9ab70202d28280eb272e3f8b403e4bf41dacc4f1ee49bacba749fd676d730075ee790df8cfda4a1f5507fc99c96ddbacd4462c1f527a4d11ca5d61c5d30eb7b580911ab62b472f2bb42a1cbbc378e7e9e785240ae3def07abe95aa9de32fe700a7a79d25dfe18d17334830f276a44b65d0d31ea312acb51bf1928814c75daddd0262d66924a25e2ec249da562b9ff14891a726f55fc620a3813fe8f8298cb7229be1efe25ea7e8be04967eca1807335a6a55848d8105c712971b1e6d0a30ea8d0d205f998bd605ee21ee1dd9dc15a8eb00b4c2e1b63c0edbe60b4fc1ec9b9118090bf168c83a2ed5b8ada845c21b049c58e8736a5ffbe963b59fdb976f0e97482aac4337034a3d9d35c123f609a4b02ac330be8468ea309c0f1eb550fed27a32554bcc772283d0a2646da784b0c66bc4d0c4e4ee7aa49d0d694a4378787d260632da8d88532feac7820a5829e916f7e29a0436379aefabaf64f0e7a1190ac1a9c8c07f1d7fd2e33c111d0d9130d4a7c68f07a127969de1bd9ffc70787215ae018aa9f1bf783848583af910fe1da7b990385dbb6aa3e4657d12fd159844b97818c418ff5302595aa29c4a075fcb6c22c6b77c8247be5ddbfdcef722230a9a0b2d576f8de2293925272cfc968671201c80b52640ad9fe5c507b926a8dea138a6fef6afe7b1bb1bf416ba6a7d7f4787a2dbb7488a874a6fcf4ef0d95586d7ec2c2390909515035496fe21be9b9e03aa8df3796b9631771610c31640888e9a9373a2e07dde393f4e56546b03ffcb46c258eb2c381b118db8002bd2930235793fb0b95a02c9868963cd8e631c8b496f2855757718f081a82e888866d133224e6f5182a99c1718ca1bcad2dda47c37df650edf568db26d672aae9a861e846b14315a963f9d007101d0ad46b58c8649e64dc27257b6b95439c55a12b5accee40cd56d3a215303e6b1d31029a73fa8e9013ca35f9df813d331f2c4094836e7fa7fb26cda6e449262393b750f45fff998d755ffdbf07612a09ede5516c9a5016de41efd2ef39b8f655fee148741838cd47ea28138a61d954777dbcf8546936296fc0eaa4ebda73ad93f332dd3d57fa36d9e1b369689251e161ada773e19401ba5ceee278b23c8f512177d0432b1342a54a4338e7457b36f94753e1a4c6faac5ec66e7da61f71da0d34bac9dc8d97ae8d4408ddc0991dd7d197272c7832e3ea3ea47f6607021ba4ff3cbd5bbce498ad73cc6fe9a24b358208ff2fab7d9f183056b0a59a7641b22f4e4e137dd12f82da3353180062b6b247b7b25aede169109050eb70c44055cd54f1c74248cec2d1dc6b80af4b8074e678a9ec66d72851a8ee0c1f3d2e66c101d1593b6152ee52645d818df2778ebd21f7c28f02ae904fbb6786bbe75677a85f2259ad8e736901fdaa31f159dbf257caf063349b56b3774672bc18de6bb5551a560a790c28e5bdf5de33e031ec561bb3ffef9270b30ecdb0792bdf799389e060707475f3ff1942aafd68cc5eb6eeca164768507dc84bd696a02db9d4b3275243f651ab07954c4b6dd2a1d7409b391ba71a4eb431afb9e923f01b0b07ca16caa26e2806e1960f931c9ccb794c5f9e9ebb7ebc709dca8d20ec21961d03a917aa291915fce595f12ddf14e5c3d6344d39c2634729cf163afb5fa531c74f239603e24bb04eef33d41231c4264270c81bb1e5d66e73b0cace3bd503005275c875193557044ba8140402996c6b036f2a24cf9d27a7cce64afa4f3aab0ec5a29cdb888d2807e09ad61ae9182005eb980f7bf213f465f5022f9fc3ceebeafe472d7d0888095b80669ef02771d402cfe3136595d7588929a64dbc692b75862e06ff933a65d922824ac1a76dcc4a07a03f775290418a7a625a456bb492c1dbaabb30a527830d9c6731c53d640e63e717e2e8") write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) [ 672.112279][T26552] IPVS: ftp: loaded support on port[0] = 21 18:22:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000240)="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") 18:22:53 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:53 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:22:53 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000, 0x2, &(0x7f0000002280)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x4801, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x20000000, 0x0, 0x0, {0x3, 0x3947, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x7, 0xd413, "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", 0xb4, 0x7f, 0x0, 0x6, 0x0, 0x40, 0x0, 0x1}}}, 0x120) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x1, 0xfffffffe, 0x1, 0x0, 0x40, 0x6, 0x3, 0x7, 0x6, 0xcd, 0x81, 0x8, 0x535, 0x4, 0x8, 0x1, {0x7, 0x7}, 0x1f}}) 18:22:53 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode-00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 673.832421][T26642] fuse: Unknown parameter 'rootmode-00000000000000000040000' [ 673.854015][T26644] IPVS: ftp: loaded support on port[0] = 21 [ 673.874308][T26648] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 673.970901][T26658] fuse: Unknown parameter 'rootmode-00000000000000000040000' [ 673.984386][T26648] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 674.073169][T26648] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 674.109558][T26644] IPVS: ftp: loaded support on port[0] = 21 [ 674.115824][T26648] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 674.160808][T26648] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 18:22:53 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:22:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmoa\x00\x00\x00\x00\x00\x00\x00id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) linkat(r2, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x45ce17d025fc5f00) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:53 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2], 0x1}, 0x50) ptrace$cont(0x1f, r2, 0x8, 0x9) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 674.734397][T26704] fuse: Unknown parameter 'rootmoa' 18:22:54 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$cont(0x9, r1, 0x0, 0x0) [ 674.822549][T26712] fuse: Unknown parameter 'rootmoa' 18:22:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) 18:22:54 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0xd9f169b4c654a73e, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:54 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x414000, 0x0) r1 = eventfd2(0x0, 0x80000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x1, r1}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67836f6aa475705f69cc4e", @ANYRESDEC=0x0]) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f00000001c0)=""/4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 674.995353][T26730] ptrace attach of "/root/syz-executor.1"[26727] was attempted by "/root/syz-executor.1"[26730] [ 675.053988][T26732] fuse: Unknown parameter 'gƒoj¤up_iÌN00000000000000000000' [ 675.083401][T26732] fuse: Unknown parameter 'gƒoj¤up_iÌN00000000000000000000' 18:22:56 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 18:22:56 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000280)=0x1c) sync_file_range(r3, 0x0, 0x5, 0x7) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x44}, 0x4010) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0xffffffff, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee01, r2) setfsgid(r2) setfsgid(r2) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) fstat(r5, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1c4b, 0x5, &(0x7f0000001440)=[{&(0x7f0000000340)="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", 0x1000, 0x74}, {&(0x7f0000000140)="b253d1efabcc2f22e4a4534e065e4940e0a27855376ae6d96db3675829319833fe2669df6429ede54509328bf74b510ea1c3adc5b14ead3fd92c051bc044ae9fd8c6ae220851a76ed602dd7a850bcd2767be745961b85d5227174ae603d3c15bf421e1482a71a268277dcd20aa258989415c3958a82c2c046e2d69a6393643de5fc0aeebfdae587eceae0dd32bf900c8d2", 0x91, 0x80800000}, {&(0x7f0000001340)="162265bdc64bde89f9f819176ddb42a962418fe81c1d19ac1520b11a4834aeb763f43eaf85cea394adbf24f913e6a8b8ef7b6c2d1f29b9902c364582a37e73faa9bd27130b992bc163e7956cefa325a00c4f89233a61e73713bce88419a073ce4909", 0x62, 0x8}, {&(0x7f00000013c0), 0x0, 0x3}, {&(0x7f0000001400)='e', 0x1, 0x4}], 0x1000041, &(0x7f0000001540)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB='\'uid=', @ANYRESHEX=r4, @ANYBLOB="2c63726561746f723d7920b9442c63726561746f723d4935e4c32c736d61636b6673666c6f6f723d66757365002c646f6e745f61707072616973652c7569643c", @ANYRESDEC=r4, @ANYBLOB=',fsmagic=0x0000000000000002,fowner>', @ANYRESDEC=r6, @ANYBLOB=',fsname=fuse\x00,\x00']) rmdir(&(0x7f00000013c0)='./file0\x00') ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000240)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:56 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x6}, 0x2c) 18:22:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 676.926246][T26748] IPVS: ftp: loaded support on port[0] = 21 [ 676.941929][T26747] hfs: unable to parse mount options [ 676.952877][T26759] ptrace attach of "/root/syz-executor.1"[26750] was attempted by "/root/syz-executor.1"[26759] 18:22:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) r3 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x1, 0x78, 0x0, 0x491, 0x62}) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASE_PORT(r6, 0x80045519, &(0x7f0000000100)=0x9) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x5) ptrace$cont(0x18, r4, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) 18:22:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 677.413074][T26748] IPVS: ftp: loaded support on port[0] = 21 [ 677.811350][T26831] hfs: can't find a HFS filesystem on dev loop5 18:22:57 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:57 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000040)={0x1, 'batadv_slave_1\x00', {}, 0x5}) 18:22:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:22:57 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x600}, 0x2c) [ 677.977426][T26852] ptrace attach of "/root/syz-executor.1"[26848] was attempted by "/root/syz-executor.1"[26852] [ 678.004699][T26847] IPVS: ftp: loaded support on port[0] = 21 [ 678.304419][T26847] IPVS: ftp: loaded support on port[0] = 21 18:22:59 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRESHEX, @ANYBLOB="3e3030303030303047119f42b9c9bf75c3cd3030303034303030302c757765725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:22:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:22:59 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$inet6_sctp(0xa, 0x1, 0x84) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) vmsplice(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x8) ptrace$setopts(0x4206, 0x0, 0x3, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x5) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:22:59 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x1000000}, 0x2c) 18:22:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 679.926758][T26907] fuse: Unknown parameter '' [ 679.937712][T26905] IPVS: ftp: loaded support on port[0] = 21 [ 679.943847][T26910] fuse: Unknown parameter '' 18:22:59 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) syz_mount_image$afs(&(0x7f0000000040)='afs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000500)=[{&(0x7f0000000140)="cf4db0db2797ed58992084f83f6d0b47d4817c88b68dc8196d5fc707843ca80af02088ede95b59e3b907dc2633126fdc9b06204c379a96d2ba474767ba0b711ee51c9e3e9a29d872", 0x48, 0x2}, {&(0x7f00000001c0)="b31d33a1722bd42ef6661a8ebd21affaa004b67a0fa80de7a12768eb63c1303c8e4f760cc53868989976472a6eae4ec23446718368fefb259d9a9333bbd586fcbd5d15f576811f6ca10091e248ec5b5df21d863245644967d1dceff66e790b88b3373835d45c56f4a46f58d7529f4d8995821e1aaad9f0a87b2a9b50e6fbdc5184e462576d2b", 0x86, 0x8001}, {&(0x7f0000000280)="589248e69f75d85ca21757a70e9eda9dba26c06e8de2ff2cbcad510acda055cb338998f3b6cb6fac85d2fa83c84ce6ef8d3cae7aef230ea4013e849f71077fd91495ca7160ab011a81d353f1bb74ff5277dffe778c1762049f32c1b674ad026ec2bda222a9cc0b1562f3e6affb0715d10ece6c68052808116329666bcbe404c80607429449f4feb72580ac", 0x8b, 0x3e38}, {&(0x7f0000000340)="b2967a05529980dbf6513812f237160d7504b70719b2581e8080e04c01d1c4931fd36ab7ac69b74c615ae37c653aaf8a5314ac2ad4bf6077f5c5ba4dbc69313fa6e21648e706f554b207f9fc59f4d65780a1715042051dc6b413370a0cef4b744b4c365cc2900fe77562621d565a10", 0x6f, 0x2}, {&(0x7f00000003c0)="ea538205e1bd5615385c0abb663a3015195d87304b9c1d9556331bc7b6cca91ce2b5ff9cebd89c859127517434983c6b3985724205f459e569055d2779ae239d3a7df69b301b9b8d6f2b144784de6d0b80faedaa86ed95565e055ff5977a87e04166d8b71ea13d6889cdd358d267692f41926dea1ade1b1d432dc0f66afd4aea630a51100fdb88be1d0082c6d093df74cd03f35628365ddcb55dca0b79330d2ec0b4ee652ed4191284", 0xa9, 0x5}, {&(0x7f0000000480)="191229f19fc6699f105ebcf7456afb56d6d74ae70d00b007adda5f820a1344627c8127f066be043678d94d8e843db1d369b785ee95497365ba0ec0183ae8986c74cc1577477e7c8f57497070e9d0eff54be56e711fbf324bd192237e639771f1f1", 0x61, 0x80}], 0x1004, &(0x7f00000005c0)={[{@autocell='autocell'}, {@flock_strict='flock=strict'}, {@flock_openafs='flock=openafs'}, {@flock_write='flock=write'}, {@flock_openafs='flock=openafs'}, {@flock_openafs='flock=openafs'}], [{@subj_role={'subj_role', 0x3d, '[user'}}, {@fowner_gt={'fowner>', r3}}, {@appraise_type='appraise_type=imasig'}]}) 18:22:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000340)=""/199, 0xc7}, {&(0x7f0000000440)=""/78, 0x4e}, {&(0x7f00000004c0)=""/201, 0xc9}, {&(0x7f0000000000)=""/45, 0x2d}, {&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000140)=""/33, 0x21}, {&(0x7f00000005c0)=""/236, 0xec}, {&(0x7f00000001c0)=""/6, 0x6}, {&(0x7f00000006c0)=""/167, 0xa7}, {&(0x7f0000000780)=""/226, 0xe2}], 0xa}, 0x2100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x180411, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRES16=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESOCT=r3]) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 680.035328][T26919] fuse: Bad value for 'fd' [ 680.159134][T26947] ptrace attach of "/root/syz-executor.1"[26927] was attempted by "/root/syz-executor.1"[26947] [ 680.269854][T26905] IPVS: ftp: loaded support on port[0] = 21 18:23:00 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:00 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="3d33c0208bb3ea70b79ddcd87516dd9e0ec8182d0991589b716f0cb108e1e76cbcfdcb955163c36f0d569fa2968c7926d5a013f4e74fc50e2ff75eecce4506cc03bef8908bace9550b34d0b1d1f8114def2ab7af03d5d4b80538d14bc9239d2a10e846af220da00d8101f5e40d3011a5585caf35fce009a5951bc9ae", 0x7c, 0xfffffffffffffffa) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(0x0, 0x5, &(0x7f0000000780)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000200)="ba3b631d9275bf00fd669d710a452bb95b30922c753f86463b4cd51944e72b0f170181fc2f078ecf", 0x28, 0x0, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000340)="87b456215d92e3ece66833c125ca1c6db8ce2d1db6cfaab4572781b48bea61d3c5af2da866d08def1630bc859c5acf6f6c5ae983946b1652b69d8d05159297fc371be212fc771dc93c6572d4ad79b8455b9d8c24c4296d3d1f45e80d6dbe6f305ead305ab6a804e3b0a90489dc09677962798abb5f8471708cb2e653f7dcf0d46540878f2106aa73e4baf0ae886ff6e1274290f4", 0x94, 0x1, 0x0, 0x7}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000440)="858eb95e7cccde523a61db02a0cc63c3a664c69e303fc952e9438812a3e671152730110a46a67b71a7ebf9b8b50ce0bb18b917d3662622f35cff30d826fa112827694f202f417ae70aa7cb59a23a49696e3022c322a0e3206de15c62e8e0bf968e66c42e24f2ea93c8d0fc40c4babaad1ea8e9cfb420d22ec7f17ac78ef00ef06f6a6b513958c590ec627875122ddfe11c695bd5d07b07e19592a49c6d486a9976c0ff64fbfcf6ca5f6e3ac9e5d687e7", 0xb0, 0x100000000, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x5, 0x1000, 0xffffffffffffffff, &(0x7f00000005c0)="f4b18a500cfb74c5306c17c19a406e5387a871b5518f7e5375c5fa61b4d93f6c25ec8e866a2710e7ee003ca238548f6918d4885791c42216bf392c2c936a7d52925240bf41f51a9521c2c8875099ec6303defc440f2b52440abfedff76966550080af4bc8e72ed16ab93113b9cccd862d686bd54c073e4332741dc28d44512e76509535a7a211dd0a73ed239043f0920f67e2b6dc560c09944b42d883b59f0343467528dcc1ef5403d745426bebd47e69381a074737cb120637c1ebf4339aa79162c3bf5361fafe75e8ed3665506247c7224bcdd8ef287a32bae151cce32bf68", 0xe0, 0xff, 0x0, 0x1}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0xff01, r3, &(0x7f0000000700)="015c15a88228bb5aea11b7a50f4436ca63bab70e500ef8fa74dbc2a07f6aa9f827817f23caa2a48f4ff73372d6dbcd3ef73e474bf9f3610066f4a31dd67c", 0x3e, 0x3, 0x0, 0x1, r5}]) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:00 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x6000000}, 0x2c) [ 681.003441][T26985] IPVS: ftp: loaded support on port[0] = 21 [ 681.011392][T26989] fuse: Bad value for 'fd' [ 681.064714][ T182] tipc: TX() has been purged, node left! [ 681.071391][ T182] tipc: TX() has been purged, node left! [ 681.099473][ T182] tipc: TX() has been purged, node left! [ 681.122027][ T182] tipc: TX() has been purged, node left! [ 681.215471][T26985] IPVS: ftp: loaded support on port[0] = 21 [ 681.245628][ T182] tipc: TX() has been purged, node left! [ 681.414696][ T182] tipc: TX() has been purged, node left! [ 681.614728][ T182] tipc: TX() has been purged, node left! [ 681.774667][ T182] tipc: TX() has been purged, node left! [ 681.934669][ T182] tipc: TX() has been purged, node left! [ 682.094600][ T182] tipc: TX() has been purged, node left! [ 682.314694][ T182] tipc: TX() has been purged, node left! [ 682.474663][ T182] tipc: TX() has been purged, node left! [ 682.634857][ T182] tipc: TX() has been purged, node left! [ 682.814535][ T182] tipc: TX() has been purged, node left! 18:23:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000001300)='./file0\x00', 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=""/180, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=""/133, 0x5000}) 18:23:02 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:02 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 682.984684][ T182] tipc: TX() has been purged, node left! [ 683.005804][T27049] fuse: Bad value for 'fd' [ 683.025258][T27051] IPVS: ftp: loaded support on port[0] = 21 18:23:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 683.078550][ T182] tipc: TX() has been purged, node left! [ 683.088240][ T182] tipc: TX() has been purged, node left! [ 683.107635][ T182] tipc: TX() has been purged, node left! 18:23:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 683.128961][ T182] tipc: TX() has been purged, node left! 18:23:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:02 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 683.282225][ T182] tipc: TX() has been purged, node left! [ 683.392963][T27051] IPVS: ftp: loaded support on port[0] = 21 [ 683.435230][ T182] tipc: TX() has been purged, node left! [ 683.441890][ T182] tipc: TX() has been purged, node left! [ 683.465648][ T182] tipc: TX() has been purged, node left! [ 683.574582][ T182] tipc: TX() has been purged, node left! [ 683.754874][ T182] tipc: TX() has been purged, node left! [ 683.894465][ T182] tipc: TX() has been purged, node left! 18:23:03 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:03 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:03 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x6}, 0x2c) 18:23:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000x0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:03 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_netfilter(r3, &(0x7f0000003600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000035c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2834000001050104abbd7000fddbdf250710000a08000700", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x3428}, 0x1, 0x0, 0x0, 0xb2594fc2fdde8416}, 0x40) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000003640)=0xffffffffffffffff, 0x4) [ 684.044475][ T182] tipc: TX() has been purged, node left! [ 684.086461][T27131] IPVS: ftp: loaded support on port[0] = 21 [ 684.103095][T27135] ptrace attach of "/root/syz-executor.1"[27132] was attempted by "/root/syz-executor.1"[27135] [ 684.123883][T27138] fuse: Bad value for 'rootmode' [ 684.136429][T27150] fuse: Bad value for 'rootmode' [ 684.144658][ T182] tipc: TX() has been purged, node left! [ 684.150788][ T182] tipc: TX() has been purged, node left! [ 684.366420][T27131] IPVS: ftp: loaded support on port[0] = 21 [ 684.381090][ T182] tipc: TX() has been purged, node left! [ 684.389595][ T182] tipc: TX() has been purged, node left! [ 684.404760][ T182] tipc: TX() has been purged, node left! [ 684.412407][ T182] tipc: TX() has been purged, node left! [ 684.425009][ T182] tipc: TX() has been purged, node left! [ 684.431147][ T182] tipc: TX() has been purged, node left! [ 684.443562][ T182] tipc: TX() has been purged, node left! [ 684.451840][ T182] tipc: TX() has been purged, node left! [ 684.614624][ T182] tipc: TX() has been purged, node left! [ 684.784473][ T182] tipc: TX() has been purged, node left! [ 684.954627][ T182] tipc: TX() has been purged, node left! [ 685.114575][ T182] tipc: TX() has been purged, node left! [ 685.294415][ T182] tipc: TX() has been purged, node left! [ 685.454398][ T182] tipc: TX() has been purged, node left! [ 685.614305][ T182] tipc: TX() has been purged, node left! [ 685.794358][ T182] tipc: TX() has been purged, node left! 18:23:05 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:05 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x121041, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETLINK(r4, 0x400454cd, 0x30c) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r5, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:05 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x185802, 0x0) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="667fbb", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6fff0f0000000000003030303030303030303030303034303030302c757365725f69643d39b2e8ad4a64bc8ac78b2902431f4686c429677484ad18119229d7367376a6497f34dbadab3f10eb048a1e0e28407d079f31909e68d9857e1055ba189ae2e3e500ec548bf3a2a533dd1fa8cadc3f9f89111bee8f5f550d157fcacf86aabfc500fce43ab1ad9f92a653fea88760fe5e10aacf6df6e09ef1765c8aa57e6ee952c903b6d70fd6f1b2dd8827ed56bf43b0c3e03d6762eec5deffc75fa8589db73a40f91422e6d44c799e48fc83c90dd12bb5526450e29866be660bf7eef6aff2dd67ae03208f7e4d3ec26ed8028aa01e21d2f7a66d750111fa4998d8cc73e3f4d8ef6912cd761f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:05 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x600}, 0x2c) [ 685.954396][ T182] tipc: TX() has been purged, node left! 18:23:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 686.032312][T27197] IPVS: ftp: loaded support on port[0] = 21 [ 686.046199][T27195] fuse: Unknown parameter 'f»0x0000000000000003' [ 686.068670][T27205] fuse: Unknown parameter 'f»0x0000000000000003' [ 686.108964][T27215] ptrace attach of "/root/syz-executor.1"[27202] was attempted by "/root/syz-executor.1"[27215] [ 686.120026][ T182] tipc: TX() has been purged, node left! [ 686.127874][ T182] tipc: TX() has been purged, node left! 18:23:05 executing program 5: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r2, 0x0) syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000240)="dcbd1a86da2b2ba28bcc84832cb36fa32385365297d8258eb9deaed79fd7a16e4e59a18880904525131a568793116bd044da70680fbd1b027c6c955c44cbd6bd58cefc0fb1a5c85e0e633add0fa7a51a2d0cadca9f2f7cfee63ca6ea4ae0194882aae19b0b032c5ca05b0a9326ff1edf9da6872bce948151bc7cf1b1dc4714dc1048aecfaa7bb2f5a1eaa773f56b901dc34a359c43ce63e17bca85faf210bb8cbd2960343c5ce8929f5c97ace0eede28af96d83009672f4a50ec9d1ca820a3dca91b44e38c07fcd5330a2de8fb28be8edfe610950353db4d573739cb97d77b266119c5a90cd833000162b7", 0xeb, 0x4}, {&(0x7f0000000140)="c6ad2b4a624d56063ae14e2d42ff18c940fac69da6b797e5648a8f48a7d8ac416e99cd3a4069082d58dcad94155c1a330eb649852462262838304aa36dc6fedebf", 0x41, 0x7fff}], 0x28062, &(0x7f0000000400)={[{@dmask={'dmask', 0x3d, 0xb01}}, {@errors_continue='errors=continue'}, {@discard='discard'}], [{@euid_lt={'euid<', r0}}, {@fowner_gt={'fowner>', 0xee00}}, {@obj_user={'obj_user', 0x3d, '\xe1zN\xaa '}}]}) r3 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x1a3) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r3, 0x40044103, &(0x7f0000000540)=0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x80042, 0x0) ioctl$VIDIOC_ENUM_FMT(r5, 0xc0405602, &(0x7f00000004c0)={0x7e, 0x3, 0x0, "3360b85d209f34babaaa646e7205e5461bcb5415790629ef507568bda84452bc", 0x3231564e}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 686.162087][ T182] tipc: TX() has been purged, node left! [ 686.199821][T27228] fuse: Bad value for 'fd' [ 686.254780][ T182] tipc: TX() has been purged, node left! [ 686.401984][T27197] IPVS: ftp: loaded support on port[0] = 21 [ 686.453482][ T182] tipc: TX() has been purged, node left! [ 686.584238][ T182] tipc: TX() has been purged, node left! 18:23:06 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r5, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:06 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:06 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1000000}, 0x2c) [ 687.126882][T27270] fuse: Unknown parameter 'dmask' [ 687.152263][T27274] fuse: Bad value for 'fd' [ 687.169041][T27277] IPVS: ftp: loaded support on port[0] = 21 [ 687.182338][T27282] ptrace attach of "/root/syz-executor.1"[27279] was attempted by "/root/syz-executor.1"[27282] 18:23:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 687.287587][T27311] fuse: Bad value for 'fd' [ 687.598564][T27277] IPVS: ftp: loaded support on port[0] = 21 18:23:08 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xb8, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffc}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdd}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfe01}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000300)=0xa) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000002c0)) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:08 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x6000000}, 0x2c) 18:23:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES32, @ANYBLOB="00082cbd7000ffdbdf250800000008000800ac1414bb08000c000000000014000600fe880000000000000000000000000001080004000300000008020000001e000106000b0002000000000000000200000014000500fe880000000000000000000000000001"], 0x6c}, 0x1, 0x0, 0x0, 0x4004000}, 0x44000) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x2bd8d94f85e9ea62) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x68, r1, 0x720, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0xb}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010101}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0xe}}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x1b, 0x1, 0x1d9, &(0x7f0000000100)}) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x2) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x5) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x400, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) [ 689.055021][T27349] IPVS: ftp: loaded support on port[0] = 21 18:23:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 689.352224][T27349] IPVS: ftp: loaded support on port[0] = 21 18:23:09 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) socket(0x11, 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, 0x0, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:09 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x4) 18:23:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) uselib(&(0x7f0000000480)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x9}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="662c000600034768d0dbd2cd9f04e1", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030a146d17b318138303030303030343030643d0000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r4], 0x1}, 0x50) syz_open_procfs(r4, &(0x7f0000000340)='net/unix\x00') r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000000300)={0x1, 0x1}, 0x2) ioctl$SIOCAX25GETINFO(r5, 0x89ed, &(0x7f0000000400)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_hwaddr=@dev={[], 0x3a}}}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r7, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820001}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x74, 0x3, 0x1, 0x301, 0x0, 0x0, {0x5, 0x0, 0x9}, [@CTA_PROTOINFO={0x48, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x44, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xa2}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x8}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1, 0x0, 0x20}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xd2}, @CTA_PROTOINFO_SCTP_STATE={0x5}]}}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0xfff}, @CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x0]}]}, 0x74}, 0x1, 0x0, 0x0, 0x48090}, 0x20008014) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 690.216628][T27428] IPVS: ftp: loaded support on port[0] = 21 [ 690.244449][T27430] fuse: Unknown parameter 'f' 18:23:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 690.364928][T27430] fuse: Unknown parameter 'f' [ 690.596321][T27428] IPVS: ftp: loaded support on port[0] = 21 18:23:11 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2000016c) 18:23:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001640)={0x0, @initdev, @remote}, &(0x7f0000001680)=0xc) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000016c0)='/proc/self/net/pfkey\x00', 0x12a00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0xe, 0xfcc, 0x20}, &(0x7f0000000280)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r6, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001900)={r5, 0x10, &(0x7f00000018c0)={&(0x7f0000001840)=""/66, 0x42, r6}}, 0x10) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001940)='/dev/nvme-fabrics\x00', 0x101102, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xf, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="9500000000001b008352000204000000"], &(0x7f0000000140)='syzkaller\x00', 0x80, 0x3d, &(0x7f00000001c0)=""/61, 0x0, 0x4, [], r2, 0x19, r3, 0x8, &(0x7f0000001700)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000001740)={0x1, 0xa, 0x8, 0x200}, 0x10, r7, r8}, 0x78) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r10, 0x40046411, &(0x7f0000000000)) 18:23:11 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2], 0x1}, 0x50) getpgid(r2) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x105002, 0x0) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f0000000100)={0x14, 0x2}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 692.137778][T27496] IPVS: ftp: loaded support on port[0] = 21 18:23:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:11 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x201}, {r0, 0xc000}, {r2, 0x10}], 0x4, 0x8) r3 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r5 = getpgrp(r3) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x5e, 0x9, 0x9, 0x28, 0x0, 0x8, 0x1000, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x5}, 0x4c53c, 0xd75, 0xff800000, 0x1, 0x2, 0x9af, 0xa983}, r5, 0x4, 0xffffffffffffffff, 0x1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x5) ptrace$cont(0x18, r4, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) [ 692.572087][T27496] IPVS: ftp: loaded support on port[0] = 21 18:23:12 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) socket(0x11, 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, 0x0, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:12 executing program 2: unshare(0x2020000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:12 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000200)={0x6, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r5, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x34}}, 0x0) sendmsg$SMC_PNETID_FLUSH(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r5, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0xc055}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc2726f75705f69643d", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 693.311616][T27587] fuse: Unknown parameter 'Âroup_id' [ 693.327475][T27590] ptrace attach of "/root/syz-executor.1"[27586] was attempted by "/root/syz-executor.1"[27590] [ 693.352497][T27594] fuse: Unknown parameter 'Âroup_id' [ 693.601882][T27588] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 693.757695][T27601] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 18:23:14 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:14 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x5f) 18:23:14 executing program 2: unshare(0x40000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x8031, r0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 695.233274][T27610] IPVS: ftp: loaded support on port[0] = 21 [ 695.251639][T27616] ptrace attach of "/root/syz-executor.1"[27613] was attempted by "/root/syz-executor.1"[27616] 18:23:14 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101700, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[0x9, 0x800, 0x8, 0x8001, 0x100000000, 0x1ff, 0x6, 0x1, 0x400, 0x4, 0x2, 0x0, 0x0, 0xffffffffffff8e84, 0x8, 0x1], 0x4000, 0x40}) tkill(r1, 0x5) syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 695.315134][T27620] fuse: Bad value for 'group_id' 18:23:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 695.459256][T27641] ptrace attach of "/root/syz-executor.1"[27636] was attempted by "/root/syz-executor.1"[27641] [ 695.462094][T27637] fuse: Bad value for 'group_id' [ 695.548808][T27610] IPVS: ftp: loaded support on port[0] = 21 18:23:15 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) socket(0x11, 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, 0x0, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:15 executing program 2: unshare(0x40000000) ustat(0x5, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:15 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000040)='lo\x00') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = socket(0x9, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee01, r5) setfsgid(r5) setfsgid(r5) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, r5, 0x7, 0x4}}}, 0xf65ca454d9a0dbee) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 696.410354][T27681] IPVS: ftp: loaded support on port[0] = 21 [ 696.434575][T27683] fuse: Bad value for 'group_id' 18:23:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 696.837318][T27681] IPVS: ftp: loaded support on port[0] = 21 18:23:17 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:17 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="ff00b400", @ANYRES16=r4, @ANYBLOB="8f6628bd7000fddbdf25080000000c0099000300000001000000"], 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:17 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_x25_SIOCADDRT(r4, 0x890b, &(0x7f0000001500)={@remote={[], 0x2}, 0x9, 'syzkaller0\x00'}) dup(r2) r5 = pidfd_getfd(r1, r2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000014c0)={&(0x7f00000001c0)="9b297ef864e8780af82d8197ab284b8f69f8a9bcccc5159d565425daa008734a5cd113a61d5c3b2008c4cfc1969614a900d634f3a74f46c0d11c189e8a4dd4f3eb0d725fd81b5d9bdae624c1e568a37967dbbce3588fe0c15903718c087a94f7a0eaf73a34edde4795f8cf9fd32b5085913cd47c88b8f79c9612580f2765bcaa3192de78ee47ced5ff43612bc2be812420e2619c3da22752fa0175bfedad2b7949bf52e4a6a29cbd7b0da6a6054e9b76125441d8d394f2848163db0c2872741994dec698b3bd7c0eb1912dcb5a377ca85c51d07cde10b1a6c9e52f8d22a90f4cf333da3252f6a0df3d9d", &(0x7f00000002c0)=""/225, &(0x7f00000003c0)="98c92c3613b3b03e029eb5d47dd7c8bba1d6b81cbfe1295d77fd1fb9804b9c9eea848207d7d5550dd32148e417f3a5e3955be069b4cc8a0113ab92105a61d73a00f902caeed57820147dcf9f07f3220f4d248659383e10dc68201050d0506a1f9d4e1d8ac85a60d94a09a24cde498738b828cbaf83d763d8edb169912da06eb2dcc2373e687aadf3bc8a775b1dd021db1dcb9c7f9036d94305b494b65f7e44c4e93c67b216ba1b9f73f08f47cdc9cfa3a39be8a5ca7a0e3d2a2848f50c13349f51db49749473c4bfc9aa32f0a07c08141d6078", &(0x7f00000004c0)="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", 0x3, r5}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r7, 0x6, 0xb, &(0x7f0000000000)=""/213, &(0x7f0000000100)=0xd5) r8 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x4e21, 0x0, 'none\x00', 0x0, 0xfffffffc}, 0x2c) 18:23:17 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x480440, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000100)=0x5023d5bd, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x202000, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000180)={0x0, 0x7, "88eed3b76deeecb379a32bdd868e4faa0e43042cd6fcef9f351c23a250af5f95", 0x6ba9, 0x1cc, 0x7, 0x7, 0xffba, 0x79, 0x3ff, 0x5, [0x1, 0x40, 0x7, 0x1]}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 698.258515][T27749] ptrace attach of "/root/syz-executor.1"[27746] was attempted by "/root/syz-executor.1"[27749] [ 698.286885][T27745] IPVS: ftp: loaded support on port[0] = 21 18:23:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 698.468657][T27769] ptrace attach of "/root/syz-executor.1"[27763] was attempted by "/root/syz-executor.1"[27769] [ 698.764507][T27745] IPVS: ftp: loaded support on port[0] = 21 18:23:18 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@mcast1, 0x7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:18 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40100, 0x100) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f0000000200)={r3, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x2, 0x1, 0x3, 0x0, 0x0, {0xc, 0x0, 0x7}, [@CTA_TUPLE_REPLY={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0xffff, &(0x7f0000000240)="d11462db1981e5bb04a3a351c9da64f9e0b525cbee79aaf96c3f5fa424fb7bc04bc5ecfe4f3494679f03e677bac893598aae71ce85b3b56ad612db312fea7c5bab42ddf5cbba980586bb663418637f60fa2c50dff0e31ba79fb3b944714da51160cb0c37fcc8630b1a8a8f01c327a7c58da6a9937df670506b10863d90f4a0b4655292ac459504ae980924fb34dc32259fc22e29cd67a3cb87645186284f66038ef37c4452d0152cb2d2935f6b") r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r4, 0x0, 0x13, &(0x7f0000000040)=0x80, 0x4) 18:23:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:18 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x402, 0x0) sendmsg$nl_crypto(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=@getstat={0xe0, 0x15, 0x800, 0x70bd2d, 0x25dfdbfe, {{'fpu(pcbc(aes-aesni))\x00'}, [], [], 0x2400, 0x600}, [""]}, 0xe0}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 18:23:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 699.492198][T27821] IPVS: ftp: loaded support on port[0] = 21 [ 699.871761][T27821] IPVS: ftp: loaded support on port[0] = 21 18:23:20 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:20 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x5, 0x2) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000140)='silent\x00', 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000100)=0x1) 18:23:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:20 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140f, 0x0, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'cm\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0xc004}, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 701.363650][T27887] fuse: Unknown parameter 'grou00000000000000000000' [ 701.400289][T27889] IPVS: ftp: loaded support on port[0] = 21 [ 701.528297][T27905] fuse: Unknown parameter 'grou00000000000000000000' 18:23:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x108c2, 0x8) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x7f, 0x9, 0x7fff, 0x0, 0x12, "4222cdc1b1038e2d"}) mkdirat(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_LINK(r4, 0x40044160, &(0x7f0000000140)=0x1ff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRES64=r2, @ANYRES16, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000001400)={0x3ff, 0x0, 0x2, 0x1}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000001440)={0x3, r7, 0x10003}) r8 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x50) capset(&(0x7f00000001c0)={0x20071026, r8}, &(0x7f00000013c0)={0x3, 0x6, 0x4, 0x7fffffff, 0x3, 0x3}) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/4096, 0x1000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 701.658558][T27920] fuse: Bad value for 'fd' [ 701.679542][T27921] fuse: Bad value for 'fd' [ 701.697826][T27922] fuse: Unknown parameter 'grou00000000000000000000' [ 701.855826][T27889] IPVS: ftp: loaded support on port[0] = 21 18:23:21 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303041303030303030303002ecaa6a3034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:21 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x1) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 702.512366][T27956] IPVS: ftp: loaded support on port[0] = 21 [ 702.521113][T27955] fuse: Unknown parameter 'group_i00000000000000000000' [ 702.541704][T27958] fuse: Bad value for 'rootmode' 18:23:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 702.578084][T27970] fuse: Bad value for 'rootmode' [ 702.650042][T27981] fuse: Unknown parameter 'group_i00000000000000000000' [ 702.802423][T27956] IPVS: ftp: loaded support on port[0] = 21 18:23:23 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:23 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0xdeed, 0xfffffffd}}, 0x30) 18:23:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:23 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x2010, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r1], 0x1}, 0x50) r2 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x5b, 0x9c, 0x3, 0x0, 0x7, 0x80, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd5578d7, 0x4, @perf_config_ext={0x100000001, 0x2}, 0x215, 0x3, 0x8001, 0x5, 0x800, 0x80, 0x400}, r1, 0xd, r2, 0x1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee01, r4) setfsgid(r4) setfsgid(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee01, r6) setfsgid(r6) setfsgid(r6) getgroups(0x4, &(0x7f00000001c0)=[0xee01, 0x0, r4, r6]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000000087a2f54ec07ba82e58d1cd8c0a56799ff45671de6b84bd86eeda04983f8a11ae69146e17031bbc002713331501d5df1b167c932fb7bf206804eb11f7451d5dabf57921aa1ac6d7ff16badc115b63950fa9261a68923498e0caa4291447c011ead2a4a912bfa9731b99d62e3fe8949f05171aa35f89d735b7ddc3f214b710908dad1c7dfa3c10a4da2d3185f0a2c8eba7fa23cbdf4497824e684855eab76fe1bf90c35db59609af2bf4d2135779182933a1d551a", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040002000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="0800010083fb8776da4b4d6c5a3ae965ef11cf6bc1f85b9e93fa2b41d17ab8f1418b3d9df6a7141a2383dc43c65ab5f92556c87a4f795ff1d1e47ed96b05e979bc6ff73581e134838260d7b845b686361631bdcfd3c33e809658f8e25120fb628f34b07f61058bceca76982e387e84f577a1a4b5f7a973bab31b4bb33d49072aef8cfc629213489f89e82146b33f46511112d1c9302490a4f03fa1981691f1d2d542a7ed4f1d6fe31808c54b3e3276adad506c948c5fd16fed4fec494b436dc2f839", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="10003773c1b173e88a5d010200000000e6372fbb27e8c1bd166a19138622b78706c56bb2e2f1e529e57c9afffca049d3dab7aea3da04b1b2810545419b3c9c5aca22dd2006ba2659a979fa2e5dce3ff9e00cd22f184b06c1d8be795a35f0a7a01d0df88f1551b32509203218c219e86d3e323b9edb06869821b14c175921aaf51764d64dcb572de6bf003578dd76a43c7dea14e0436155b67df9a5b30ba5b93472dd5b158ec63e3d16167b87c67f7d6b2ccbc0cddbbb34432cd5fa93bd3a3b09d301bb4526a71f92584c1e14691dd94572a0b1b3d83c"], 0x74, 0x3) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:23 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:23 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000100)=""/196) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x5) ptrace$cont(0x18, r3, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) [ 704.406068][T28023] fuse: Unknown parameter 'group_i00000000000000000000' [ 704.416164][T28022] IPVS: ftp: loaded support on port[0] = 21 [ 704.585731][T28051] ptrace attach of "/root/syz-executor.1"[28044] was attempted by "/root/syz-executor.1"[28051] [ 704.616558][T28022] IPVS: ftp: loaded support on port[0] = 21 18:23:24 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:24 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:24 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffffa8}, {0x0}, {&(0x7f0000000040)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x10002, 0x4) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x9, 0x20010, r4, 0x10000000) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:24 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setresgid(0x0, 0xee01, r0) setfsgid(r0) setfsgid(r0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xee01, r2) setfsgid(r2) setfsgid(r2) getgroups(0x6, &(0x7f0000000080)=[0x0, 0x0, r2, 0xee00, 0x0, 0xee01]) setregid(0x0, r3) r4 = socket$inet(0x2b, 0x1, 0x0) r5 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r5], 0x1}, 0x50) r6 = syz_open_procfs(r5, &(0x7f0000000000)='ns\x00') ioctl$SNDRV_PCM_IOCTL_PAUSE(r6, 0x40044145, &(0x7f0000000040)=0xfffffff9) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80000, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x7, 0x84a, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000000140)={0x1}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r6) 18:23:24 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 705.557498][T28103] fuse: Unknown parameter 'group_id00000000000000000000' [ 705.582288][T28105] IPVS: ftp: loaded support on port[0] = 21 [ 705.593749][T28114] ptrace attach of "/root/syz-executor.1"[28109] was attempted by "/root/syz-executor.1"[28114] 18:23:24 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x2e, 0x1e, 0x15, 0x19, 0x2, 0x7ff, 0x1, 0x53, 0x1}) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) ptrace$cont(0x18, r2, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000140)={0x7, 0x3, 0x8000, 0x0, 0x5}) ptrace$cont(0x9, r2, 0x0, 0x0) 18:23:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:25 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000100)=0x8, 0x4) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7, 0x4}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r4}, &(0x7f00000001c0)=0x8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) [ 705.751489][T28144] ptrace attach of "/root/syz-executor.1"[28138] was attempted by "/root/syz-executor.1"[28144] [ 705.771272][T28147] fuse: Unknown parameter 'group_id00000000000000000000' 18:23:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:25 executing program 1: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) signalfd4(r1, &(0x7f0000000040)={[0x1ff]}, 0x8, 0x400) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x5) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) getpid() ptrace$cont(0x9, r0, 0xffffffffffffffff, 0x1) [ 705.932315][T28159] fuse: Unknown parameter 'group_id00000000000000000000' [ 706.061134][T28105] IPVS: ftp: loaded support on port[0] = 21 18:23:27 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:27 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$isdn_base(r2, &(0x7f0000000000)={0x22, 0xf, 0x1, 0x20, 0xff}, 0x6) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2, @broadcast, 0x4e24, 0x0, 'wrr\x00', 0x0, 0x0, 0x3}, 0x2c) 18:23:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000100005027be88674b36573f00000000000b0000000018dd160000000000000000718471"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r0, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0xc000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES32, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r2, r4, 0x80000) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x11, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000800)={r8, @in={{0x2, 0x4e22, @empty}}, 0x80, 0x8}, 0x90) [ 708.581573][T28208] fuse: Bad value for 'user_id' [ 708.590639][T28207] IPVS: ftp: loaded support on port[0] = 21 [ 708.597040][T28209] fuse: Bad value for 'user_id' 18:23:27 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 708.669128][T28208] fuse: Bad value for 'user_id' 18:23:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f00000000c0)=0x1e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 708.760188][T28235] fuse: Bad value for 'user_id' 18:23:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 708.915663][T28254] fuse: Bad value for 'user_id' 18:23:28 executing program 1: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x177}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x4, {0x0, 0xfffffffd, 0x0, {0x0, 0x4, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xee01, 0x0, 0xb, 0x10}}}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCPNENABLEPIPE(r4, 0x89ed, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:23:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 709.017272][T28207] IPVS: set_ctl: invalid protocol: 2 255.255.255.255:20004 [ 709.058924][T28207] IPVS: ftp: loaded support on port[0] = 21 [ 709.066293][T28260] ptrace attach of "/root/syz-executor.1"[28259] was attempted by "/root/syz-executor.1"[28260] [ 709.133715][T28263] fuse: Bad value for 'fd' 18:23:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:28 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x9}, 0x8) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="b0fced210b4576308a333d0f6d0ab62ef4dc9bd3424a8b9c446cb94fe42bfee01de0af89905f51a6a14a799ab12bf15d5dbc8065b9ab4db734a37430616d293b0480041978617432f23990ef7257e11ea370dd5ee4b1a68627bd047e2383b2e8a4677b7d9944c3e8a2a455ff054ecc53fa03e07804813e391e70d7dd7d27a2d34e81", @ANYRES16=0x0, @ANYBLOB="000425bd7000fddbdf2503f1000005000500020000000500030007000000"], 0x24}}, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xffffffffffffffff, 0x0, 0xfffffffffffffffd, &(0x7f00000001c0)="21b139a20dab17664679bc8024b6aedb82fe158d41e232506c613d8fc2bc47fbcfc422e46d91d8131ffa27af76f2") ptrace$cont(0x9, r1, 0x0, 0x0) [ 709.279844][T28283] fuse: Bad value for 'fd' 18:23:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:30 executing program 2: unshare(0x20800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:30 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="45e9aed12f060000000000000025d8687d0100009a1a175ca8ff6a7884abb57ef866bf0afdff7a97ec8d19fbe348", 0x2e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x7, r1, 0x3fffffffffffffe, 0x6) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) clock_getres(0x5, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0xc) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000140)={0x8, 0x7, 0x8008, 0x7fffffff, 0x7, 0x1, 0x40, 0x4, r6}, &(0x7f00000001c0)=0x20) ptrace$cont(0x9, r1, 0x0, 0x0) [ 711.631017][T28315] fuse: Bad value for 'fd' 18:23:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00c344662ec1f90400000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x24, 0x0, &(0x7f0000000000)=[@request_death={0x400c630e, 0x1}, @increfs_done={0x40106308, 0x3}], 0x5, 0x0, &(0x7f00000000c0)="31b40be824"}) 18:23:30 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:30 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000001c0), 0x4) getpriority(0x2, r0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$vhci(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="043a04fa50d63f63aa020bf58273072a140cae201d1ec23187965ad58dfbe54d61b7e2443d18a40c4baf9fcbec4426db60fd1ce6c6ae8e9b403b36779f9afa4ee91beaef1754d806c7f01751448441143be9c27000a2cabfc6655bb2a1efb024a9f80aa2d8ab5362b10ee94ad27c65ff642a233d4058551d00"/136], 0x88) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0xa) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) accept4$inet(r3, 0x0, &(0x7f0000000040), 0x800) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x14bf8c80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x4, 0x0, 0x8000, 0x0, 0x4, 0x2, 0x0, 0x0, 0x2, 0x0, 0x400, 0xee01, 0x0, 0x7}}}, 0x84) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 711.813734][T28328] fuse: Bad value for 'fd' 18:23:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='Fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:31 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) r2 = getpid() setpgid(0x0, r0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2], 0x1}, 0x50) capget(&(0x7f0000000040)={0x20071026, r2}, &(0x7f0000000100)={0x2, 0xffffffc1, 0x327, 0x9, 0x1f, 0xfffffff7}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r3 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r3], 0x1}, 0x50) r4 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r4], 0x1}, 0x50) ptrace$cont(0x20, r4, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 711.966082][T28337] fuse: Unknown parameter 'Fd' [ 711.968640][T28338] fuse: Bad value for 'fd' [ 712.007119][T28342] fuse: Unknown parameter 'Fd' [ 712.156869][T28348] ptrace attach of "/root/syz-executor.1"[28345] was attempted by "/root/syz-executor.1"[28348] 18:23:33 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x220042, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000140)={0x300, 0x354, 0x400, 0x258, 0x3, 0x2, 0xe, 0x2, {0x100, 0x7}, {0x9, 0x20}, {0x4, 0xa, 0x1}, {0x80, 0x58, 0x1}, 0x0, 0x2, 0x3ff, 0x9, 0x0, 0x3, 0x1130, 0x10a, 0x8, 0x2f, 0x0, 0x800, 0x1d, 0x4, 0x5064fa4c08b3153, 0x5}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:33 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$l2tp(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000180)=0x10) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x1, 0x2, 0x18, 0xd, "e2241b30bed325faad4395bc4b0de02c4c8886a4f4e4ed0b1ce84f28daff6f9c303085d5e1e3b1a6595ca913e0797598684d03488f394369d2274209b183eebf", "10fb8d60ace5d91bcaddede9c02ac44dc0d9be72b44f09f899d68a8a2426d025", [0x7ff, 0x3]}) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:33 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 714.631359][T28358] fuse: Bad value for 'fd' [ 714.656566][T28359] IPVS: ftp: loaded support on port[0] = 21 [ 714.669450][T28367] ptrace attach of "/root/syz-executor.1"[28364] was attempted by "/root/syz-executor.1"[28367] 18:23:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req={0x9, 0x40, 0x9, 0x4}, 0x10) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:23:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 714.815383][T28384] fuse: Invalid rootmode 18:23:34 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) prctl$PR_MCE_KILL_GET(0x22) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 714.926227][T28407] fuse: Invalid rootmode [ 714.943249][T28413] ptrace attach of "/root/syz-executor.1"[28410] was attempted by "/root/syz-executor.1"[28413] [ 715.102810][T28359] IPVS: ftp: loaded support on port[0] = 21 18:23:36 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:36 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:23:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast1, 0x4000, 0x0, 'none\x00', 0x68, 0xfffffffc}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000280)=[@mss={0x2, 0x3}, @mss={0x2, 0x3}, @sack_perm], 0x3) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x800) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000080)={0xfffffff, 0x89, 0x401, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990a60, 0xffff, [], @p_u16=&(0x7f0000000000)=0x6}}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r8, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}]}, 0x44}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r8, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xfe26}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040}, 0x0) 18:23:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) bind(r1, &(0x7f0000000140)=@sco, 0x80) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:37 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:23:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 717.690608][T28462] fuse: Invalid rootmode [ 717.695395][T28461] IPVS: ftp: loaded support on port[0] = 21 [ 717.725024][T28463] IPVS: ftp: loaded support on port[0] = 21 18:23:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x1) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1a8}, 0x1, 0x0, 0x0, 0x40001}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000300)={0x9, 0xb, 0x4, 0x40000, 0x5, {}, {0x1, 0x8, 0x3f, 0x3b, 0x8, 0x20, "75a39ccb"}, 0x5, 0x2, @userptr=0x7ad, 0x20, 0x0, r3}) mkdirat(r4, &(0x7f0000000380)='./file0\x00', 0x81) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x3}}, 0x30) 18:23:37 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 717.905447][T28488] fuse: Bad value for 'rootmode' 18:23:37 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r2) [ 718.220816][T28461] IPVS: ftp: loaded support on port[0] = 21 18:23:39 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:39 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:39 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x6000000, 'none\x00'}, 0x2c) 18:23:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r2, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80, 0x0) flistxattr(r3, &(0x7f00000000c0)=""/15, 0xf) 18:23:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dcaae8272052dcacf92d1844cd9ed4a38272c8abf30b9a89e4290ee7290e750cb3ad47625de0284be167b078a7566be29649e406e5a92f941", @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 720.759175][T28583] fuse: Bad value for 'rootmode' [ 720.764836][T28582] fuse: Bad value for 'group_id' [ 720.778249][T28587] fuse: Bad value for 'group_id' [ 720.799170][T28584] IPVS: ftp: loaded support on port[0] = 21 18:23:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0xbc8c61, &(0x7f0000000240)=ANY=[@ANYBLOB="f532620b91375e84d267cec897227726249d3ffdda1880a12a38bbda7b8feddd9a98a973be0b85db3ac3edcbfef048c573afd9902cd2c13bcb25b48cebff704a2242b5a04ab5016fcef49101f9e430afd0f4e6e55ad49182774004d01f6531e2475cb4e8446f8e6cdf2082ee9ef0657852d09440d71ffe4d1d1dd335e6059eca2a0ed9e6e7d2c7b0368dadfee4ee75d5a51529e9414c88221130ac2174f1486456f9748c14da400e7e00fcc986aec7f4c907292dab56c30cb5", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:40 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 720.835089][T28588] IPVS: ftp: loaded support on port[0] = 21 [ 720.915693][T28597] fuse: Bad value for 'rootmode' 18:23:40 executing program 0: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:23:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000000)=0x8001) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 721.135255][T28649] ptrace attach of "/root/syz-executor.0"[28647] was attempted by "/root/syz-executor.0"[28649] [ 721.136477][T28648] fuse: Unknown parameter 'use00000000000000000000' [ 721.339263][T28588] IPVS: ftp: loaded support on port[0] = 21 18:23:43 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:43 executing program 0: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:23:43 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x13, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x5, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2c, @rand_addr=0x64010102, 0x0, 0x0, 'none\x00', 0x28a3eaeed34b23f7, 0x0, 0x1}, 0x2c) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$l2tp6(0xa, 0x2, 0x73) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:23:43 executing program 5: personality(0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETFMTS(r2, 0x8004500b, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xffff, 0x565403) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000340)={0x6, 0xc, 0x4, 0x1000, 0x446, {0x0, 0xea60}, {0x2, 0x0, 0x6, 0x9, 0x3f, 0x6, "80f2edcd"}, 0x7fffffff, 0x3, @userptr=0x3, 0x40, 0x0, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPROPERTY(0xffffffffffffffff, 0xc04064aa, &(0x7f0000000000)={&(0x7f00000004c0), &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], 0x0, 0x0, [], 0x0, 0x6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) modify_ldt$write2(0x11, &(0x7f0000000480)={0x0, 0x20000000, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES16, @ANYBLOB="2c726f6f746d6f626a42993797e36b303030303030300d4b30081b3034303030302c75f3e5725f69643d", @ANYRES64=r3, @ANYBLOB=',group_id=', @ANYRESHEX=r4]) r7 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r7, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="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"/532], 0x9f, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 723.827415][T28706] ptrace attach of "/root/syz-executor.0"[28704] was attempted by "/root/syz-executor.0"[28706] [ 723.863605][T28705] IPVS: ftp: loaded support on port[0] = 21 18:23:43 executing program 0: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:23:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000140)={0x0, 0x4f4, 0xfff, &(0x7f00000000c0)=0x30000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000)=0x100, 0x4) [ 723.887642][T28708] IPVS: ftp: loaded support on port[0] = 21 [ 723.899596][T28710] fuse: Unknown parameter 'use00000000000000000000' 18:23:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 724.001130][T28728] ptrace attach of "/root/syz-executor.0"[28726] was attempted by "/root/syz-executor.0"[28728] 18:23:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 724.165140][T28758] fuse: Unknown parameter 'use00000000000000000000' 18:23:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 724.245179][T28773] ptrace attach of "/root/syz-executor.0"[28772] was attempted by "/root/syz-executor.0"[28773] [ 724.324282][T28776] fuse: Unknown parameter 'user_i00000000000000000000' [ 724.392038][T28782] ptrace attach of "/root/syz-executor.0"[28780] was attempted by "/root/syz-executor.0"[28782] [ 724.419210][T28705] IPVS: ftp: loaded support on port[0] = 21 18:23:46 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:23:46 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x7fff, 0x10000}, 0x20}, 0x10) 18:23:46 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "06214c5f57e455daf71eaf640381988fbab469d2"}, 0x15, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 726.919170][T28829] IPVS: ftp: loaded support on port[0] = 21 [ 726.926486][T28832] ptrace attach of "/root/syz-executor.0"[28830] was attempted by "/root/syz-executor.0"[28832] [ 726.947201][T28834] fuse: Unknown parameter 'user_i00000000000000000000' 18:23:46 executing program 0: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 726.972712][T28833] IPVS: ftp: loaded support on port[0] = 21 18:23:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 727.119914][T28870] ptrace attach of "/root/syz-executor.0"[28866] was attempted by "/root/syz-executor.0"[28870] 18:23:46 executing program 0: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 727.197304][T28887] fuse: Unknown parameter 'user_i00000000000000000000' 18:23:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:46 executing program 0: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 727.274573][T28896] ptrace attach of "/root/syz-executor.0"[28894] was attempted by "/root/syz-executor.0"[28896] [ 727.382449][T28899] fuse: Unknown parameter 'user_id00000000000000000000' [ 727.390505][T28902] ptrace attach of "/root/syz-executor.0"[28900] was attempted by "/root/syz-executor.0"[28902] 18:23:46 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 727.455103][T28829] IPVS: ftp: loaded support on port[0] = 21 18:23:49 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:49 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x80}}, 0x30) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$TIOCGPTPEER(r1, 0x5441, 0x10001) 18:23:49 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x8bf}, 0x2c) 18:23:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 729.996756][T28950] fuse: Unknown parameter 'user_id00000000000000000000' [ 730.026469][T28951] IPVS: ftp: loaded support on port[0] = 21 [ 730.039327][T28953] IPVS: ftp: loaded support on port[0] = 21 18:23:49 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 730.142058][T28965] fuse: Unknown parameter 'user_id00000000000000000000' 18:23:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:49 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 730.307925][T28981] fuse: Bad value for 'fd' 18:23:49 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 730.475891][T28990] fuse: Bad value for 'fd' [ 730.800783][T28957] IPVS: ftp: loaded support on port[0] = 21 18:23:50 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:50 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x80) syz_emit_ethernet(0x2e, &(0x7f0000000100)={@local, @local, @void, {@ipv4={0x800, @igmp={{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@timestamp={0x44, 0x4, 0xdf, 0x0, 0xf}]}}, {0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}}}}}, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 18:23:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x3, 0x101) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:23:50 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 731.068580][T29073] fuse: Bad value for 'fd' 18:23:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 731.129701][T29078] IPVS: ftp: loaded support on port[0] = 21 [ 731.135761][T29079] IPVS: ftp: loaded support on port[0] = 21 18:23:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 731.279775][T29102] fuse: Bad value for 'fd' [ 731.616780][T29078] IPVS: ftp: loaded support on port[0] = 21 18:23:52 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:52 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:52 executing program 2: listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/230, 0xe6) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40, 0x0) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000280)=0x6e) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) 18:23:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 733.340154][T29179] fuse: Bad value for 'fd' [ 733.350230][T29180] IPVS: ftp: loaded support on port[0] = 21 [ 733.363232][T29177] IPVS: ftp: loaded support on port[0] = 21 [ 733.486485][T29196] fuse: Bad value for 'fd' 18:23:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 733.645691][T29234] fuse: Unknown parameter '0x0000000000000003' 18:23:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 733.780365][T29237] fuse: Unknown parameter '0x0000000000000003' 18:23:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 733.848344][T29180] IPVS: ftp: loaded support on port[0] = 21 [ 733.955115][T29262] fuse: Unknown parameter '0x0000000000000003' 18:23:53 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:53 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 734.177141][T29269] IPVS: ftp: loaded support on port[0] = 21 [ 734.190885][T29270] fuse: Unknown parameter '0x0000000000000003' 18:23:55 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0xf, 0x4e3, 0x1}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000000)='vboxnet0md5sum,\x00', 0x10) 18:23:55 executing program 1: unshare(0x40000000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 736.402188][T29314] IPVS: ftp: loaded support on port[0] = 21 [ 736.421225][T29316] fuse: Unknown parameter '0x0000000000000003' [ 736.429105][T29313] IPVS: ftp: loaded support on port[0] = 21 18:23:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:55 executing program 1: unshare(0x40000000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 736.635031][T29362] fuse: Unknown parameter '0x0000000000000003' 18:23:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 736.746897][T29369] IPVS: ftp: loaded support on port[0] = 21 [ 736.754667][T29370] fuse: Unknown parameter 'fd0x0000000000000003' 18:23:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 736.798298][T29314] IPVS: ftp: loaded support on port[0] = 21 [ 736.899177][T29394] fuse: Unknown parameter 'fd0x0000000000000003' 18:23:56 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:56 executing program 1: unshare(0x40000000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 737.183348][T29420] IPVS: ftp: loaded support on port[0] = 21 [ 737.249167][T29426] fuse: Unknown parameter 'fd0x0000000000000003' 18:23:58 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r4, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:58 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:23:58 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0x1, 0x4) 18:23:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) 18:23:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 739.471972][T29472] IPVS: ftp: loaded support on port[0] = 21 18:23:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x3, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 739.925167][T29472] IPVS: ftp: loaded support on port[0] = 21 18:23:59 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:23:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:23:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) [ 740.276057][T29549] fuse: Bad value for 'fd' 18:24:01 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r3, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:01 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 18:24:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/223, 0xdf}, {&(0x7f0000000180)=""/69, 0x45}, {&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f0000000300)=""/79, 0x4f}, {&(0x7f0000000100)=""/60, 0x3c}], 0x5, 0xfffffffffffff0a5) syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0x20, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r3, &(0x7f0000002400)=[{{&(0x7f0000000480)=@generic, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)}, {&(0x7f0000000540)=""/123, 0x7b}, {&(0x7f00000005c0)=""/94, 0x5e}, {&(0x7f0000000640)=""/92, 0x5c}], 0x4, &(0x7f0000000700)=""/60, 0x3c}, 0x4}, {{&(0x7f0000000740)=@ipx, 0x80, &(0x7f0000000c00)=[{&(0x7f00000007c0)=""/92, 0x5c}, {&(0x7f0000000840)=""/52, 0x34}, {&(0x7f0000000880)=""/114, 0x72}, {&(0x7f0000000900)=""/78, 0x4e}, {&(0x7f0000000980)=""/249, 0xf9}, {&(0x7f0000000a80)=""/198, 0xc6}, {&(0x7f0000000b80)=""/91, 0x5b}], 0x7}}, {{&(0x7f0000000c80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)=""/226, 0xe2}, {&(0x7f0000000e00)=""/108, 0x6c}], 0x2, &(0x7f0000000ec0)=""/39, 0x27}, 0x3f}, {{&(0x7f0000000f00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002340)=[{&(0x7f0000000f80)=""/255, 0xff}, {&(0x7f0000001080)=""/210, 0xd2}, {&(0x7f0000001180)=""/25, 0x19}, {&(0x7f00000011c0)=""/128, 0x80}, {&(0x7f0000001240)=""/217, 0xd9}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x6, &(0x7f00000023c0)=""/4, 0x4}, 0x400}], 0x4, 0x40002140, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x1c, r6, 0x301, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000002500)={r8, @rand_addr=0x64010102, @empty}, 0xc) connect$l2tp6(r2, &(0x7f0000000440)={0xa, 0x0, 0xb3b, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7, 0x1}, 0x20) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) [ 742.468918][T29566] IPVS: ftp: loaded support on port[0] = 21 [ 742.548638][T29570] fuse: Bad value for 'fd' 18:24:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000000)=0x7fff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x0, 0x1f, 0x1, 0x0, [0x0]}}, 0x29) [ 742.742599][T29605] fuse: Bad value for 'fd' 18:24:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r7, 0x89ed, &(0x7f0000000140)) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 743.064674][T29566] IPVS: ftp: loaded support on port[0] = 21 18:24:02 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x29, 0x4, 0x0, {0x0, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 18:24:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:04 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x28}, 0x28) 18:24:04 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0xa, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:04 executing program 1: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 745.564852][T29672] IPVS: ftp: loaded support on port[0] = 21 18:24:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 745.763423][T29700] IPVS: ftp: loaded support on port[0] = 21 [ 745.958681][T29672] IPVS: ftp: loaded support on port[0] = 21 18:24:05 executing program 1: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:05 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)={'none\x00'}, 0x6, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x7ff}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000140)={0x6, @rand_addr=0x64010101, 0x0, 0x0, 'dh\x00'}, 0x2c) 18:24:05 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 746.314194][T29758] IPVS: ftp: loaded support on port[0] = 21 18:24:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r5, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r5, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) dup(r0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x29, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 746.602271][T29793] IPVS: ftp: loaded support on port[0] = 21 18:24:05 executing program 1: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 746.864932][T29758] IPVS: ftp: loaded support on port[0] = 21 18:24:07 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:07 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x11, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r5, 0x6, 0x3f}, 0xc) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x5e, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0xfffffffc}, 0x2c) 18:24:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:07 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x3f00000000000000, 0x0) 18:24:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r4, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x64e7}, @ETHTOOL_A_LINKMODES_OURS={0x124, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe0, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'em1%[]vboxnet1selinuxuser\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'fuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "f0b5ba64acd9f6b209b2ab3b3802f583f59457413b73ade7566d9d4505c2b4f06f3dc00fe0ba1c26d05d9f6715c5f0736bfc95dfe6a8749efcdc"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x1f}]}, 0x180}, 0x1, 0x0, 0x0, 0x240548d1}, 0x880) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 748.609414][T29860] IPVS: ftp: loaded support on port[0] = 21 [ 748.622662][T29863] IPVS: ftp: loaded support on port[0] = 21 18:24:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 748.865702][T29860] IPVS: set_ctl: invalid protocol: 94 224.0.0.1:0 [ 748.889242][T29860] IPVS: ftp: loaded support on port[0] = 21 [ 748.899544][T29914] IPVS: ftp: loaded support on port[0] = 21 18:24:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 749.075459][T29959] IPVS: ftp: loaded support on port[0] = 21 18:24:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 749.189667][T29912] IPVS: set_ctl: invalid protocol: 94 224.0.0.1:0 [ 749.240528][T29985] IPVS: ftp: loaded support on port[0] = 21 18:24:08 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:08 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000100)=0xffff7fff, 0x4) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x1c, r1, 0x301, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@newtfilter={0x28cc, 0x2c, 0x200, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x8, 0xb}, {0xfff2, 0xffff}, {0x0, 0xfff2}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x14d4, 0x2, [@TCA_RSVP_POLICE={0x80c, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1ff, 0x9, 0x400, 0x8001, 0x5, 0x0, 0x0, 0x0, 0x40, 0x2e4, 0x8000, 0x9, 0x9, 0x4, 0x3, 0x7f, 0x401, 0x6, 0x1c, 0x3, 0x1, 0x1ff, 0x5, 0x5, 0x7fffffff, 0x3, 0x8, 0x2, 0x80000000, 0xfffffff8, 0x6, 0x101, 0x9af, 0xffff, 0x9, 0x5, 0x101, 0x7fff, 0x3, 0x8, 0x1, 0x5, 0x40, 0x1, 0x8000, 0xffffff24, 0xe, 0x889, 0x1ff, 0x9, 0x20, 0x81, 0x1000, 0x7fffffff, 0xffff0001, 0x8, 0x1, 0x2, 0x4, 0x6, 0x4, 0xaed, 0x8, 0x6, 0x6, 0x2, 0x4, 0xfffffff8, 0x9, 0x9, 0x9, 0x5, 0x401, 0x6, 0x2, 0x6, 0x2, 0x3, 0x3, 0x7, 0x8001, 0x0, 0xfb, 0x10000, 0x41f4e19, 0x3ff, 0x2, 0x1ff, 0x7, 0x2, 0xb603, 0x2, 0x4, 0x7, 0x0, 0x9, 0x9cb, 0x9, 0x8, 0xcc35, 0x3, 0x5, 0x7, 0x4a3697d5, 0x4, 0x200, 0x8925, 0x6, 0x8, 0x6, 0x80000001, 0x1, 0x4ab, 0x5, 0x6, 0x8, 0x0, 0x1, 0x0, 0x9, 0x7, 0xffffffff, 0x3ff, 0x9, 0xf4, 0x400, 0x2, 0x5, 0x80000000, 0x3, 0xffff6307, 0x34, 0x20c, 0x7b1, 0x3f, 0x49, 0x0, 0xffff, 0xfffffffc, 0x5, 0x4, 0x8000, 0xffffffff, 0x7, 0x401, 0x3ff, 0x2d, 0x7, 0xacdc, 0x1c0a, 0xfff, 0x200, 0x4, 0x3, 0x1, 0xf0000000, 0x8, 0x1, 0x200, 0x8, 0x9, 0x100, 0x2, 0xfffff21b, 0x401, 0xcc49, 0x7, 0x3, 0x200, 0x6, 0x5, 0x9, 0x100, 0x3, 0xfffffff8, 0x2, 0x6, 0x1, 0x6, 0x5, 0x10001, 0x0, 0x5, 0x9, 0x6, 0x1000, 0x400, 0x0, 0x9, 0x8, 0x0, 0xd351, 0x4, 0x5, 0x6, 0x42a2e093, 0x2, 0x0, 0x2400, 0x913, 0x55dc, 0xef, 0x0, 0x3ff, 0x0, 0x101, 0x80, 0x800, 0xffffffff, 0x0, 0x1f, 0x8, 0x9, 0x10001, 0x6, 0x0, 0x86, 0x1, 0x10000, 0x1000, 0x80000000, 0x22a, 0x4, 0xfffffffb, 0xc08a, 0x8001, 0x81, 0xa00000, 0x695c, 0x82a5, 0x8, 0x4, 0xbc, 0xffffff3a, 0x1f, 0x69ea, 0x7fff, 0xffffff81, 0x6, 0xfffffffd, 0x7fffffff, 0x557, 0x3, 0x6, 0xffff, 0x4, 0x2, 0xfffffffb, 0x0, 0x6, 0x4, 0x401, 0x6, 0x5, 0x800, 0x8]}, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x40, 0x7, 0x3, 0x7fff, 0x6, 0xae, 0x0, 0x10000, 0x8001, 0x2c, 0x9, 0x0, 0x7, 0x1, 0x8, 0x3f, 0xbfc, 0x1769f9ef, 0x7fff, 0x7, 0x4, 0x7, 0x1000, 0x2, 0xffffffff, 0x7, 0x0, 0x80, 0x9, 0x1ff, 0x80000001, 0x200, 0x3, 0x3, 0x56e4, 0x1, 0x4, 0xfffffff7, 0x1ff, 0x2, 0x3, 0x3ff, 0x9, 0x3, 0xae5, 0xc19d, 0x5, 0x0, 0x400, 0x0, 0x6, 0x7, 0x7fff, 0x8001, 0x1, 0x95ea, 0x0, 0x5, 0x7, 0x5004, 0x3, 0x5, 0x3, 0x8000, 0x10001, 0x1, 0x7, 0x8000, 0x601, 0x10001, 0x100, 0x80000001, 0x7b, 0xab5, 0x5fb, 0x9, 0x0, 0x5a23, 0x10001, 0x0, 0x5, 0x68, 0x10000, 0x80000000, 0x6, 0x4, 0xffff, 0x0, 0x8, 0x10001, 0x4, 0x5, 0x3, 0x8, 0x4, 0x10001, 0x8, 0xffffff29, 0x8, 0x9, 0xda6eba3d, 0x80, 0x0, 0xd02, 0x0, 0x8, 0x9bed, 0x3, 0x0, 0x7, 0x10000, 0x10001, 0x1000, 0x4, 0x6, 0x20, 0x400, 0x6, 0x5, 0x8dc, 0x523, 0x80000000, 0x2, 0x5, 0x1, 0xad, 0x7ff, 0x2, 0x9, 0x4, 0x2, 0x101, 0xc0649d8, 0x1, 0x6, 0x20, 0x1, 0x8, 0x40, 0x7, 0x5, 0xfffff800, 0x40000000, 0x7f, 0x8001, 0xff, 0x4, 0x3688, 0x2, 0x0, 0x6, 0x3, 0x4, 0x3, 0x1, 0x401, 0x3, 0x9, 0x47f, 0x20, 0x8, 0x8, 0x4, 0x5, 0x40, 0x8, 0x0, 0x7, 0x7, 0x9c, 0x3cff056a, 0x7ff, 0x1, 0x4, 0x1795, 0x9d, 0x0, 0x1, 0x1000, 0x7, 0x8000, 0x0, 0xca, 0x80000001, 0xfffffffe, 0xf460, 0x9, 0x7, 0xe274, 0xffff, 0x6, 0x7, 0x80, 0x80, 0x80000001, 0x80, 0x3ff, 0x3ff, 0x2, 0x5, 0x6, 0xd5, 0x101, 0x6, 0x6, 0x8, 0x800, 0xffff, 0x5, 0x80, 0x1, 0x8, 0x1f, 0x3f, 0x9, 0x8, 0x0, 0x2, 0x7, 0x0, 0xff08, 0x5, 0xb1, 0x0, 0x21cb36f0, 0x48, 0x81, 0x7, 0x6, 0x5, 0x1f, 0x63, 0x8000, 0xfffffffc, 0x4, 0x6, 0xfff, 0x7fffffff, 0x0, 0xebc, 0x5, 0xffffffff, 0x9, 0xb65, 0x0, 0x7, 0x6, 0x4, 0x5b, 0x0, 0x6, 0x7ff, 0x6, 0x6, 0x3]}]}, @TCA_RSVP_SRC={0x8, 0x3, @multicast1}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xc, 0x6}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xfff2, 0x9}}, @TCA_RSVP_POLICE={0xc9c, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x80, 0xa6db, 0x4, 0x100, 0x6, 0x3ff, 0xb5e, 0x7941, 0x7fff, 0x5, 0x1, 0x7, 0x80000001, 0x0, 0x1f, 0x1, 0x2, 0x20, 0x0, 0x6, 0x0, 0xffffffc0, 0x401, 0x100, 0x9000, 0x1, 0x8, 0xfffffff8, 0x1, 0x3, 0x6000, 0xfffeffff, 0x80000001, 0x80000000, 0x80000001, 0x0, 0xfffffff7, 0x7, 0xf92, 0x800, 0x8, 0x6, 0x1, 0x0, 0x7fff, 0xffff, 0x1, 0x7a6, 0x9, 0x2, 0x2, 0xe1, 0x3, 0x3, 0x5, 0x180, 0xfff, 0x8, 0x4, 0x40000, 0x0, 0x5, 0x66, 0x1, 0x0, 0x6, 0x40, 0xd7, 0x8, 0x772, 0x1, 0xff, 0x732, 0x10001, 0x7, 0x3, 0x8, 0x2, 0x5, 0xff, 0xb56, 0x9, 0x9, 0x4, 0x7, 0x10c, 0x8, 0x7ff, 0x9, 0x4c, 0xa3fb, 0x2, 0xb7, 0x2, 0x8, 0x8, 0x4, 0x1, 0x78, 0x731b, 0x8, 0x37, 0x5, 0x401, 0x7f, 0x9, 0x6, 0xf0ec, 0x2, 0x8, 0x0, 0x7f, 0x1, 0x1e, 0x9, 0x4, 0x80000001, 0x8, 0x1, 0x0, 0x3f, 0x0, 0x100, 0x0, 0x3, 0x6, 0x10000, 0xf4, 0x400, 0x4, 0x6, 0x8, 0x4, 0x80, 0xdb24, 0x3, 0x80, 0xfffff800, 0x1f, 0x8, 0x8, 0x9, 0x2000000, 0x8, 0x1b6, 0x1, 0x7f, 0xf8, 0x0, 0x26, 0x20, 0x1000, 0x0, 0x6, 0x2, 0x62be, 0x5, 0x7, 0xffff, 0x0, 0x4, 0x1, 0xfff, 0xdbf, 0x9, 0x8ecf, 0x80000001, 0x2, 0x7fff, 0xfffffffe, 0xd9c, 0xfffffffe, 0x1000, 0x3, 0x30c, 0x7fffffff, 0x1, 0x1, 0x8, 0x4, 0xfffffffd, 0x8, 0x4, 0x8b2, 0x8000, 0x3, 0x40, 0xd9, 0x2, 0x3b, 0xd0, 0x5, 0xfffffff8, 0x9283, 0xfffffffc, 0x5, 0x9, 0x10001, 0x80000000, 0x2, 0x0, 0x20, 0x4, 0x10000, 0x0, 0x7, 0x1, 0x6, 0x10001, 0x6, 0xfff, 0x3, 0x8, 0x101, 0xff, 0x800, 0xf873, 0x3ff, 0x0, 0x9, 0x7, 0xa9b, 0x6, 0xfff00, 0x1f29f6d0, 0x0, 0x6d, 0x9, 0x8001, 0xffffffc0, 0xd, 0x548f, 0x3, 0x5, 0x9, 0x2, 0x80000000, 0x4f3c, 0x4, 0x8, 0x7, 0x7ff, 0x3, 0x40, 0x2, 0x8001, 0x1, 0x4, 0x200, 0x10001, 0x4, 0x6, 0xd3b, 0x0, 0x10000, 0xb9e]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xb6f, 0x8, 0x5e4e, 0x9, 0x7fffffff, {0x5f, 0x2, 0xd739, 0x3, 0xfdb, 0x1000}, {0x81, 0x1, 0x7, 0x6, 0x6a, 0xa0000}, 0x3, 0xfffffffe, 0x10000}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x20}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xa52, 0xfffffff9, 0x1, 0x2, 0x4, 0x5, 0x5, 0x1, 0x25, 0x9, 0x3, 0x4, 0xffff, 0x6, 0x100, 0x1f, 0x7, 0x2, 0x1, 0x8, 0x0, 0x8, 0xfffffff8, 0x4000000, 0x1, 0x5, 0xfffffffa, 0x3, 0x10001, 0x5, 0xffff, 0x3f, 0x40, 0x8, 0x9, 0x5, 0xf0, 0x2, 0x200, 0x3, 0x101, 0x8001, 0x5, 0x7, 0x0, 0x3, 0x1ff, 0x6, 0x7f1, 0x5, 0x3665, 0x80, 0x1, 0x0, 0xffff, 0xb0e, 0x400, 0x6, 0x400, 0x0, 0x2702, 0x3, 0x81, 0x7, 0x1, 0x3, 0x9, 0x0, 0x3, 0x4, 0x81, 0xaa4, 0xffff0000, 0x1, 0x7, 0x0, 0x1f0, 0xc659, 0x7, 0x5, 0x0, 0x2, 0x5, 0x101, 0x1f, 0x3ff, 0x1, 0x6, 0x5, 0x6, 0x100, 0xeb, 0x7, 0x0, 0x4, 0xff, 0x4, 0x80, 0x3, 0x1, 0x1, 0x1, 0x3f, 0x2, 0x6, 0x101, 0x1f, 0x2, 0x1ff, 0x1, 0x40, 0x1, 0x1d, 0x4, 0x80000001, 0x5, 0x9236, 0x8, 0x7fffffff, 0x9465, 0x7, 0xffff, 0x7, 0xa99, 0x4, 0x7, 0xffffffff, 0x5, 0x0, 0x7, 0x3, 0x7f, 0xa3, 0x2, 0x6, 0x2, 0x9, 0x4, 0x5, 0x2, 0x1, 0x7, 0x2, 0x8, 0x6, 0x7fff, 0x52, 0x9, 0x3f, 0x2, 0xfffffffd, 0x1ff, 0x1ff8000, 0x7fff, 0x7, 0x400, 0x401, 0x87, 0xffffffc1, 0x7d, 0xc1, 0x1a9ac000, 0x0, 0x6, 0x8, 0xc2, 0x6a2, 0xfffffe01, 0x3, 0x8000, 0xf892, 0xfffffc36, 0xc29, 0x4, 0x2, 0x5, 0x1, 0x26f9, 0x3, 0x7, 0x20, 0x4, 0x400, 0x9, 0x9, 0x3, 0x30000, 0x9, 0x9, 0x6, 0x9, 0x42e, 0x80, 0xfffff000, 0x2, 0x4, 0x6, 0x1, 0x3, 0x3, 0x3, 0x3, 0x7, 0x1000, 0x6, 0xfffffffe, 0x6, 0xffffffff, 0x3, 0x9, 0x81, 0x1, 0x6, 0x0, 0x5, 0x2, 0x2, 0x7, 0x6, 0x8, 0x0, 0xfffffff7, 0x100, 0xbe0, 0xa161, 0x1, 0xb35f, 0x1, 0x6, 0xa664, 0x1, 0xc30a, 0x2, 0x400, 0x5, 0x6c9a, 0x8d, 0x0, 0x8, 0x8, 0x1, 0x1fb6, 0x5, 0x6, 0x8, 0x2, 0x0, 0x5, 0x1, 0x6, 0xf0b, 0x3, 0x9, 0x5, 0x80, 0xfffffffc]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x1, 0x9, 0x317ddcb5, 0x4, {0xe, 0x1, 0x7ff, 0x2, 0x0, 0x7}, {0x2, 0x0, 0xffff, 0x3, 0x3b23}, 0xd6e, 0x3ff, 0x8}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x97bd, 0xffff, 0x101, 0x7, 0x3, 0xf76, 0x3, 0x9, 0x6, 0x7f, 0xa000, 0x7, 0x3ff, 0x7, 0x248000, 0x400, 0x5, 0x7fffffff, 0x100, 0x8, 0xd8, 0x80000000, 0x5, 0x3a5, 0x6, 0x5, 0x8001, 0x6feb7283, 0x3, 0x40, 0x0, 0xee6, 0xd8, 0x9, 0x60e1, 0x6, 0x3, 0x47ab08d1, 0x7fffffff, 0x0, 0x400, 0x3, 0x8, 0x7, 0x9229, 0x6835, 0x8, 0x5, 0xffffffff, 0x1, 0x2, 0xfc, 0x7, 0x8, 0x4, 0x0, 0x6, 0x3, 0x8ac8, 0x6, 0x400, 0x2, 0x10001, 0x0, 0x8, 0x7, 0x100, 0x7, 0xe601, 0x0, 0x1, 0x1, 0x6, 0x1, 0x8, 0x6, 0x1, 0x7, 0x6, 0x4, 0x8, 0x1ff, 0x7f, 0x3, 0x9, 0x4, 0x3, 0x1ebd, 0xebb, 0x5, 0x5eb3, 0x0, 0x6, 0x0, 0x1f, 0xffffffff, 0x0, 0x43c, 0x0, 0x4, 0x7, 0xe1, 0x686, 0x5, 0x5b69, 0x1, 0x7, 0x800, 0x5, 0x43aa, 0xfffffff7, 0x7, 0xff, 0xfffffbff, 0x8575, 0x20000, 0xb8e9, 0x0, 0x3f5, 0x7, 0x3, 0x20000, 0x1, 0x3, 0xb1a, 0x2, 0x3, 0x9f, 0x8, 0x3, 0x7f, 0x3, 0x9, 0x5, 0x7, 0x80000001, 0xfff, 0x1ff, 0x80000000, 0x3, 0x100, 0xfff, 0x4, 0x54e1, 0x5, 0x1142, 0x2, 0x7, 0x8000, 0x8, 0xffffff81, 0xb529, 0x0, 0x7, 0x9, 0x8, 0x3, 0x3, 0x80000001, 0x80, 0x9d, 0x2, 0x9, 0x7, 0x1, 0x7, 0x4, 0x1, 0x100, 0x20, 0x3, 0x4, 0x9, 0x0, 0x81, 0x7ff, 0x4, 0x5, 0x8000, 0x8, 0x0, 0x4, 0x6, 0x100, 0x200, 0x20, 0x4, 0x2, 0x1f, 0x8001, 0x1, 0x101, 0xff, 0x1e, 0x9, 0x33e, 0x3f, 0x4, 0x3, 0x0, 0x10000, 0x9, 0x1, 0x81, 0x5, 0x8000, 0xfffffe00, 0x0, 0x8001, 0x9, 0xfff, 0x80000001, 0x1, 0x800, 0x1, 0x8, 0x0, 0x80000001, 0x101, 0xfff, 0x7f, 0x400, 0x3ff, 0x5, 0x1, 0x7, 0x81, 0x2, 0x0, 0xdf6e, 0x800, 0x0, 0x8, 0x5, 0x0, 0x3, 0x3, 0x5c9, 0x6, 0x6, 0x81, 0x1, 0x4, 0x8b9b, 0xca, 0x0, 0x8000, 0x8, 0x1, 0x0, 0x9, 0x5, 0x6, 0x2, 0x4, 0x7]}]}, @TCA_RSVP_SRC={0x8, 0x3, @rand_addr=0x64010101}, @TCA_RSVP_DST={0x8, 0x2, @remote}]}}, @TCA_CHAIN={0x8, 0xb, 0x1}, @TCA_CHAIN={0x8, 0xb, 0x1}, @TCA_CHAIN={0x8, 0xb, 0x35b1}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x13a4, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x20}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x1a}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_IIF={0x8, 0x4, r3}, @TCA_ROUTE4_ACT={0x1380, 0x6, [@m_skbmod={0xc8, 0xe, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x8}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x4, 0x2, 0xffffffffffffffff, 0xbc}, 0xc}}]}, {0x85, 0x6, "c84e344b25220a935da82c053ac52e69847dbe0672dbeb9fea449ac3c1fa942954973484b3dbded9847fb8cc7862ccb0ef1b1f3ddb28dffeade07ba0b8a3f42f585768a336abf23897ca5c82e0f69e2102a1a9988d12f476218c757989c22284171054eb9b243c09861e78e8f186694bc7864be6b1b107a9492d02e1ef9700a19c"}}}, @m_skbedit={0xa8, 0xd, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x4, 0x10000000, 0xffffffff, 0x6}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x1}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xb, 0x1}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x7}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xffffff80, 0x7f, 0x6, 0x10000, 0xfffffffb}}]}, {0x41, 0x6, "a3d3f88af89f9ee30ebc03026e67dc608ae90d0b44f490465577ba61605b2afe892ae826ba2d408fcaa86cbd60fb6643b6a4f9ec1b9bc0e0307cf42255"}}}, @m_gact={0x12c, 0x1f, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x1c75fdbd, 0x8, 0x0, 0x3, 0x3b}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x225e, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x227d, 0x10000000}}]}, {0xe8, 0x6, "b182de7a22946b5ffaf1d87ca5809e6740b25232116126ff9f451803090475d4b2068d13d818b05e890010a586a3cb975b11bc448fc35a9544ea6592244e9d9532a0564ea3dbe9843e1c2d1e9e7b1d2914ad219608600f53486e00f82131dbc321ac67da2e3d157c61db98b27b5dca3d262c7548d6feb78c56a0c3da4da5c80e9a111cf542b52ba2f5eb9ca40f55703f3dbeb11db49a1a2b95aa1f049b841003b10a86f1f9b845ad8d4aa2de6882c4f64203474f674c600ae0e86afebb7930e97a9674d04d8a6de0a3c1b5569e6f89191ce28c8cad6d478f5178d594f9e611ebf26c6c7c"}}}, @m_ctinfo={0x110, 0x11, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x8, 0x9, 0xffffffffffffffff, 0xe, 0xe487}}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x401}, @TCA_CTINFO_ZONE={0x6}]}, {0xd2, 0x6, "da268d1c85289da2b150e29fced672f2960fd16b51e341c36d4b380c879726d9fc92c5eb536dbac53b4523dbbbdf610a35d4f83e54af145f7bdb69de3064705db6ebe6beb69d4eba3fa348331393f02812f992cd108e3dcc7e8f4d2714aa106ea4cc0bfc03e2da2c1fc41b3fc3877e8dae9edc5b12caec98afb63b497f4ee9fa8ec26ed079b43358a06f169bec7671610dbb218d9ba904f7af9bbe8a03ded873629e595d3fa57e99e3372aebf7c9b1ccf94a2fb6de90d644ede8d76bd0ba399e90c13976dc945e2acd775e654347"}}}, @m_ct={0x150, 0x6, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_CT_ACTION={0x6, 0x3, 0x4}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x1}, @TCA_CT_MARK_MASK={0x8}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @rand_addr=' \x01\x00'}]}, {0xff, 0x6, "0361759b96f87b5032313eb1c9962aca8d1b98efe1ad15a54cd72fd64009cf01593208aa9dd64b35e7d0b083d5acb7ddb0b572607f07024670dc01687d757c7467bb60ba71bd2a62925754a7bc14a395afb6c42a28214a825c41eae36cfe10a392f269a12fa33829cffbada07edfb59d2c2abb0670c0eb82a10fc58e92ed4ee11cc09d31f1251b0d86de8493fdc70e23dd6a865fb4c81e4dcead534be1a4a2b3c0076767f850c273db9862cce1e26656db4ebb6ef39d42f3f8880202017bd93d3a15d23d28e71b4f2486bc0bf38eea850ffee62f820fa98687c81ab48609bc8a7e2b4601b0a90d5d7bedbde3b9659a7f289824b2b106c143a500bb"}}}, @m_sample={0x140, 0x1e, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x8}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x1}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x100}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x8, 0x2, 0x4, 0x1, 0x7}}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xc9ad}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0xffffffe1, 0x4, 0x7, 0x9fd2}}]}, {0xdc, 0x6, "0d3558ddbd0eea68746ef3d7697fdfe9ea72256810b5841f665d0aeef5f2024b05cd027f54cf40e05ab1cf119827edef211d6f3896edf1949ddc1cd568f6f113467fcc046a4ad27ce138f7d82654607014f4b8aace38df35f2a933d18151ea766800a8e54bf25b3fbcbe3a21a88164f0f740318b82d88607582246531e935f7c1f29d88885a62f43f095a6d9b5ad6b3294ca574e0343874bae2c7d6c8c9d09b536e079ac4a084b7e74a6394bd971f0dc2daaada147bd15b69b638b4156fdc58388f6070ea3d4b9c247c1ecea93d8199d6d44689ce509afea"}}}, @m_police={0xd40, 0x3, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xc4c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x401, 0xfffffffe, 0x2, 0x4, 0x6b, 0xfffffffa, 0x101, 0x1, 0xffffffc1, 0x1ff, 0x8, 0x20, 0xa0e, 0x1000, 0x9, 0xfffffc01, 0x5, 0x7, 0x2, 0x8001, 0x50, 0x4c, 0x38e, 0x10000, 0x200, 0x9, 0x4, 0x6, 0x5, 0xfffffff9, 0x20, 0x4, 0x3, 0x101, 0x81, 0x1, 0x4, 0x8cfd, 0x40, 0x9, 0x9, 0x8001, 0x80000001, 0x4, 0x8000, 0xfffffffa, 0xf49, 0xd7, 0x3ff, 0x55d, 0x3, 0x1, 0x10000, 0xfffffffb, 0xd8, 0x4, 0x3, 0x8000, 0x7f, 0x7, 0x2, 0xf19, 0xfffffbff, 0x1, 0x4, 0x9, 0xe58, 0x293, 0x101, 0x3ee, 0x1, 0x1, 0x3, 0x1, 0x20, 0x6, 0x6, 0x4, 0x7, 0xfffffff9, 0x8000, 0xfff, 0x1f, 0x6, 0x9, 0x80000000, 0x8, 0x7, 0x4, 0x0, 0xd6bf, 0x1, 0x8, 0x7667, 0xfffffffb, 0x7, 0x5b, 0x5, 0x81, 0xfffffffd, 0x6f7, 0x3, 0x4, 0x8, 0x5, 0x45, 0x8000, 0x800, 0x8, 0xffff, 0x9, 0x0, 0x4, 0x5, 0x6d6a0ac2, 0xfffffff7, 0x379, 0x9, 0x1ff, 0x7fffffff, 0x40, 0x0, 0xffff605b, 0xf80, 0x100, 0x2, 0x4, 0x1f, 0x98, 0x7ff, 0x3, 0x3, 0x5, 0xef, 0x7e9, 0xd05a, 0x7, 0x9a, 0xffff, 0x4, 0xff, 0x6, 0x9, 0x7f, 0xb87, 0x949, 0x625, 0x8001, 0xef, 0x9, 0xff, 0x0, 0xff, 0xffffff4e, 0x4, 0x665, 0x100, 0x8000, 0x2, 0x0, 0xffffffff, 0x0, 0xa, 0x7f600000, 0xfffffff7, 0x0, 0x56, 0x2, 0x2, 0x100, 0xa01, 0x3, 0x101, 0x54, 0x4, 0x6, 0x80000000, 0x1000, 0x9, 0xbe4, 0x6, 0x8, 0x9d7, 0x1ff, 0xfffffca4, 0x1, 0x5, 0xdc2e, 0x2, 0x1a, 0x8, 0x2, 0x3, 0x6, 0x1, 0xfffffffe, 0x1, 0xffffff00, 0xfffffffb, 0x8, 0x6, 0x80000000, 0x869a, 0x2, 0x0, 0xffffffff, 0x1, 0x6, 0x3f, 0x9, 0x200, 0x3, 0x200, 0x0, 0x80000000, 0xfd, 0x159883ec, 0x0, 0x401, 0x1a08, 0xff, 0x8, 0x9, 0x400, 0x1, 0x1, 0x8001, 0x0, 0x0, 0x3f, 0x3, 0x7fff, 0x1, 0x7fff, 0x4, 0x101, 0x8, 0x40fe, 0x1, 0xffff, 0x80000001, 0x2, 0x800000, 0x1, 0x4, 0x4505ec7a, 0xfffff000, 0x6, 0x9, 0xd49, 0x72, 0x7f, 0x6, 0x6, 0x1, 0x2]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x80000001}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffffffa, 0xfffffffb, 0x200, 0x1, 0x1ff, 0x8, 0xffffffff, 0x3, 0x2, 0xffffffff, 0x7, 0x6, 0x1, 0xffff, 0x200, 0x666e, 0x401, 0x7, 0x2, 0xfffffffd, 0x886, 0x0, 0x5, 0x76, 0x5, 0x2, 0x3, 0x1, 0x1, 0x9, 0x40000000, 0x377, 0x7fff, 0x8, 0x1f, 0x6d35, 0x4, 0x4, 0x5, 0x2, 0x2, 0x7, 0x655, 0x1, 0x10000, 0x7fff, 0x200, 0x9ef8, 0x8001, 0x7fff, 0xffff0001, 0x8, 0x80000000, 0x1, 0xff, 0x4d5, 0xcb, 0xffff, 0xffffffe0, 0x7fffffff, 0xfff, 0x8001, 0x0, 0x400, 0x49bc, 0xfffff801, 0x80, 0x3, 0x3, 0x45, 0x3, 0x4036, 0x3, 0x0, 0xffff, 0x9, 0x25, 0x4, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x2, 0x0, 0x10000, 0x1, 0x2e8, 0xfff, 0x2, 0x3f, 0x6, 0x995, 0x2, 0x5, 0x0, 0x9, 0x0, 0x7ff, 0x5, 0x0, 0x7ff, 0x8, 0xffffffff, 0x7ff, 0x5, 0x9, 0x3ff, 0x7, 0xfffffbff, 0xffffffff, 0x7fff, 0x54, 0x10001, 0x4, 0x9, 0x9, 0x9, 0x6000000, 0xa1, 0x8, 0x3, 0xfffffffc, 0x6, 0x0, 0x4, 0x1ff, 0x0, 0x4, 0x3ff, 0x400, 0x0, 0xa1, 0x5b, 0x80000000, 0x1f, 0x6, 0x30, 0x9, 0x9026, 0xe45, 0x6, 0x3, 0x1000, 0x401, 0x9, 0x6, 0x3, 0x9, 0x6, 0x34f, 0x56, 0x4, 0x8, 0xb873, 0x6, 0x8, 0x3, 0x2, 0x6, 0x3, 0x0, 0x9, 0x3ff, 0x0, 0x6, 0x6, 0x4, 0x1, 0x6, 0x9, 0x100, 0x0, 0x400, 0x80, 0x4, 0xfffffffb, 0xff, 0x80000001, 0x2, 0x5, 0xfff, 0x40, 0x100, 0x4, 0x6, 0xa857, 0xf85c, 0x6, 0x10000, 0x9, 0xc93, 0x7fffffff, 0x6, 0x20, 0x7ff, 0x20, 0x8, 0x40, 0x1, 0x6, 0x1, 0x7, 0x0, 0xffffff77, 0x1, 0x8, 0x2, 0x27ed, 0x0, 0xff, 0x3ff, 0x4ec22fcc, 0x428f, 0x7, 0x8, 0x0, 0x98, 0xf480, 0xffffffff, 0x7, 0x2, 0x3714, 0x8, 0x8, 0x4, 0x3, 0xa7b7, 0x1, 0x28f4a334, 0x3, 0xffffff00, 0x0, 0x3, 0x10001, 0x80000001, 0x906b, 0x2, 0x49e, 0x1, 0x3, 0x6, 0x9, 0xfffffb88, 0x4, 0x5, 0x10001, 0x0, 0x8, 0x1, 0x7fffffff, 0xa9, 0x1, 0x5, 0x8, 0x8]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xff}, @TCA_POLICE_RATE64={0xc, 0x8, 0x80000001}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x1ff, 0x438, 0x400, 0x3ff, 0xfff, 0x8, 0x4a, 0x3, 0x7, 0x8000, 0x100, 0x3, 0xff, 0x1, 0xa2e3, 0x7, 0x1, 0x89, 0x1, 0x0, 0x8, 0x40, 0x4, 0x3, 0x8, 0x6, 0x0, 0x27, 0x1, 0x5, 0x1, 0x4, 0x3, 0x6, 0x5, 0x2, 0x3, 0x649, 0x3f, 0xa2fe, 0x8, 0x10001, 0x81, 0x7ff, 0x1ff, 0xff, 0x2, 0xffffffff, 0x8, 0x4, 0x9265, 0x3, 0x0, 0x8, 0x6, 0x7, 0x7fffffff, 0xfffffff6, 0x9, 0xb9, 0x1, 0x3ff, 0xffffff00, 0x32, 0x7, 0x7, 0x0, 0x400, 0x60, 0x80000001, 0x800, 0x1, 0xffff, 0x6, 0x1f, 0x1, 0x6, 0x97d, 0x3, 0x0, 0x4bd, 0x5, 0x80, 0x4, 0x1000, 0x3ff, 0x3, 0x40, 0xffffff81, 0x401, 0x3f, 0x1, 0x8000, 0xae7, 0x3ff, 0x2, 0x3, 0x6, 0x3, 0x5, 0x200, 0x5, 0x7, 0x8, 0x3ec, 0x8, 0x6, 0xffff, 0x7fff, 0x5, 0x6, 0x8001, 0x43c9, 0x3, 0x6, 0xd4, 0x4, 0xffff6d0a, 0x3, 0xff, 0x5df, 0x0, 0x101, 0x7, 0x1ff, 0x3f, 0x200, 0x3f, 0x7, 0xaa73, 0xa98f, 0xff, 0x3d5, 0xfffffffd, 0x9, 0x3, 0xfff, 0xde, 0x68, 0x5db272dd, 0x8, 0x401, 0x3, 0x4, 0xfff, 0x6, 0x9, 0x7, 0x9, 0x1, 0x9, 0x9, 0x6, 0x200, 0x1, 0x7f, 0x4, 0x2, 0xfffffffa, 0x3, 0x1, 0x80000000, 0x101, 0x1, 0xd03, 0x4b5, 0x8, 0xfffff801, 0x1f, 0x8, 0x1, 0x1, 0x6, 0x8000, 0x10001, 0x3, 0x3, 0x80000001, 0x9, 0x8000, 0x8, 0x7, 0x7ff, 0xffffffff, 0x101, 0x9, 0xfc000000, 0xffff8000, 0xffffffe1, 0xe0, 0x1f, 0xf913, 0x43, 0x80000000, 0x0, 0x0, 0x549a, 0x4, 0x6, 0x8001, 0xe236, 0x7, 0x4, 0x1, 0x42f721e9, 0x5239, 0x8, 0xe0, 0x20, 0x800, 0x3, 0x18, 0x7f, 0x2, 0x7, 0x5, 0x6, 0x4, 0x6, 0x100, 0x2, 0x7, 0x80000000, 0x1000, 0x4, 0x5, 0x7, 0x66, 0xfffffff8, 0x2, 0x1, 0x1f, 0x7ff, 0x7, 0x90, 0x7, 0x20, 0x8, 0x6e, 0x9, 0x4461, 0xfffffffc, 0x5, 0x400, 0x40, 0x80000001, 0x2, 0x80000000, 0x2, 0x20, 0x10001, 0x487a, 0x8000, 0x9]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x90b}, @TCA_POLICE_AVRATE={0x8}]]}, {0xe2, 0x6, "49bc96be4c9948d2d0d3f5a3f210eab877ffc4152aae46717e90327ff20d83e6eb6e87d9462908454761dae3bea6239fc6dbb19c41f2ef60d3e52d240057b9e8dce91f31c661575b34d2c3570df3b28db03e7fad4199f831c1ac7462cc5d3d133c011b7f02f1a1d1e49bbdf7293e5bd853bf21f635ec7289e3ee04113a70484fdbc8fdc564cc8e7435922a7fd8f0c04928d3956e34cbfbbeb917757b32d26789a94a77c7f297a18cfc9d3046e593309963486d115214f4e144ef517b86c0b7a863fd29e6514264597896ca6059fcc332ab0e40db022fe894651199594d13"}}}]}]}}]}, 0x28cc}, 0x1, 0x0, 0x0, 0x40}, 0x40) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r3, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000300)={@empty}, &(0x7f0000000340)=0x14) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 749.496495][T30012] IPVS: ftp: loaded support on port[0] = 21 [ 749.538263][T30022] IPVS: ftp: loaded support on port[0] = 21 [ 749.887318][T30022] IPVS: ftp: loaded support on port[0] = 21 18:24:10 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:10 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:10 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/50) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000680)={0x80000000, 'syz1\x00'}) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f00000003c0)={0xffffffffffffffff, 0x8}) socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10840, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x3, 0x1, 0x200, 0x3, 0x20}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000000)={0x1, 0x4b, 0x20, 0x9, 0x8, 0x48, 0x40, 0x1, 0x8, 0x81, 0x7, 0x4, 0x9}, 0xe) r6 = getpid() openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvme-fabrics\x00', 0x90082, 0x0) clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r6], 0x1}, 0x50) ptrace$peeksig(0x4209, r6, &(0x7f0000000040)={0x2, 0x0, 0x4}, &(0x7f00000001c0)=[{}, {}, {}, {}]) 18:24:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000480)={0x18, r3, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:10 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x3f00000000000000, 0x0) [ 751.668450][T30106] IPVS: ftp: loaded support on port[0] = 21 [ 751.684111][T30105] IPVS: ftp: loaded support on port[0] = 21 18:24:11 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 751.888125][T30158] IPVS: ftp: loaded support on port[0] = 21 [ 752.079737][T30105] IPVS: ftp: loaded support on port[0] = 21 18:24:11 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffffb, 0x2000) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000180)="aadd32ba44884c0d0494376619c8810a42ad29fc2330a8fb80128880e1efc9f0cde5865c0d514b303eee94ba571a64484759557c9b16", 0x36) r3 = accept4(r1, 0x0, &(0x7f0000000140), 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x11, &(0x7f0000000080)={r2}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r2, 0x2de, 0x10, 0xffffffffffffffe0, 0x3}, &(0x7f00000000c0)=0x18) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x3a, @multicast1, 0x0, 0x2, 'none\x00', 0x0, 0x0, 0x80}, 0x2c) fremovexattr(r0, &(0x7f0000000100)=@known='system.posix_acl_access\x00') [ 752.298695][T30206] IPVS: ftp: loaded support on port[0] = 21 [ 752.366367][T30211] IPVS: ftp: loaded support on port[0] = 21 18:24:11 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 752.804209][T30211] IPVS: set_ctl: invalid protocol: 58 224.0.0.1:0 [ 752.826856][T30211] IPVS: ftp: loaded support on port[0] = 21 [ 752.833594][T30270] IPVS: ftp: loaded support on port[0] = 21 18:24:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) [ 753.146742][T30268] IPVS: set_ctl: invalid protocol: 58 224.0.0.1:0 [ 753.191453][T30316] IPVS: ftp: loaded support on port[0] = 21 18:24:13 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:13 executing program 2: unshare(0x40000000) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:13 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:13 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) [ 754.708594][T30356] IPVS: ftp: loaded support on port[0] = 21 [ 754.757537][T30358] IPVS: ftp: loaded support on port[0] = 21 [ 755.067691][T30358] IPVS: ftp: loaded support on port[0] = 21 18:24:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 18:24:14 executing program 3: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000240)={0x27, 0x0, 0x0, 0x0, 0x0, 0xfd, "75b782e4ad88b89d1fc31916080000000788ccfc7f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a", 0x1}, 0x60) [ 755.222888][T30426] IPVS: ftp: loaded support on port[0] = 21 18:24:14 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:14 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000000)) 18:24:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) [ 755.623140][T30474] IPVS: ftp: loaded support on port[0] = 21 [ 755.625163][T30473] IPVS: ftp: loaded support on port[0] = 21 [ 755.968144][T30473] IPVS: ftp: loaded support on port[0] = 21 18:24:16 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0xfffffff, 0x8001, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9909d5, 0x2, [], @value=0x2}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 18:24:16 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x74, &(0x7f0000000080)={0x0, 0x0, 0x10}, &(0x7f00000000c0)=0x18) ioctl$BLKPG(r6, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @remote}, 0x1, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)='lo\x00', 0xfffffffffffffffc, 0xffffffffffffff80, 0x1ff}) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0xffff}, &(0x7f0000000040)=0x8) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 757.715791][T30555] IPVS: ftp: loaded support on port[0] = 21 18:24:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 757.790574][T30559] IPVS: ftp: loaded support on port[0] = 21 18:24:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 758.250624][T30555] md: invalid raid superblock magic on mtdblock0 [ 758.264035][T30555] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 758.274525][T30555] md: md_import_device returned -22 [ 758.302840][T30555] IPVS: ftp: loaded support on port[0] = 21 [ 758.436993][T30621] md: invalid raid superblock magic on mtdblock0 [ 758.449818][T30621] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 758.458912][T30621] md: md_import_device returned -22 18:24:17 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:24:17 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) 18:24:17 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$phonet(0x23, 0x2, 0x1) bind$phonet(r4, &(0x7f0000000100)={0x23, 0xff, 0x0, 0x43}, 0x10) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f00000000c0)) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000000)="9c0cff1d71658560b666a8315fddb12c1fb178259b33ebf4ec595a8fdf8ce3e2fe51e2acdab5cff7ea8119f642d7757fde3a0618284860c6d159301a0b8286c0204f30ad2c9f8b1f4c7968b79bcd64a0ab2ff14c0bd8760fcce8235ef60ac8adbef7dfa8466af590a439beeac3100e13d51bc5e87bab695a2f2e9450945e1eb8f159d63fbd1cfb80e5309038efba9e4c87f6431053cb13d63027a125", 0x9c) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 758.693363][T30657] IPVS: ftp: loaded support on port[0] = 21 [ 758.704014][T30656] IPVS: ftp: loaded support on port[0] = 21 18:24:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:18 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:24:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:18 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) [ 759.269261][T30657] IPVS: ftp: loaded support on port[0] = 21 18:24:20 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) 18:24:20 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:20 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 18:24:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) [ 761.701803][T30765] IPVS: ftp: loaded support on port[0] = 21 18:24:21 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 761.751530][T30768] IPVS: ftp: loaded support on port[0] = 21 18:24:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) 18:24:21 executing program 4: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:24:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:21 executing program 4: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 762.025551][T30829] ptrace attach of "/root/syz-executor.4"[30828] was attempted by "/root/syz-executor.4"[30829] [ 762.138558][T30835] ptrace attach of "/root/syz-executor.4"[30834] was attempted by "/root/syz-executor.4"[30835] [ 762.217352][T30765] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 [ 762.237030][T30768] IPVS: ftp: loaded support on port[0] = 21 18:24:24 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:24 executing program 4: getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:24:24 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:24 executing program 2: unshare(0x2041800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x11, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={r3, 0x401}, &(0x7f0000000380)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x80000000fb) ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000240)) r6 = socket$inet(0x2b, 0x5, 0x3) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f00000000c0)={0x2, 0x0, [{0x0, 0xaa, &(0x7f0000000000)=""/170}, {0xf000, 0xac, &(0x7f0000000180)=""/172}]}) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000140)={0x3c, @multicast1, 0x4e21, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e23, @private=0xa010101}, 0x1b0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)='bridge_slave_1\x00', 0x8, 0x20, 0xd09}) 18:24:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 764.750494][T30878] ptrace attach of "/root/syz-executor.4"[30877] was attempted by "/root/syz-executor.4"[30878] 18:24:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) [ 764.816158][T30881] IPVS: ftp: loaded support on port[0] = 21 18:24:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 764.873100][T30889] ptrace attach of "/root/syz-executor.4"[30888] was attempted by "/root/syz-executor.4"[30889] 18:24:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r0, 0x0, 0x4) 18:24:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 765.033548][T30910] ptrace attach of "/root/syz-executor.4"[30908] was attempted by "/root/syz-executor.4"[30910] 18:24:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r0, 0x0, 0x4) [ 765.155074][T30916] ptrace attach of "/root/syz-executor.4"[30915] was attempted by "/root/syz-executor.4"[30916] [ 765.261538][T30887] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 18:24:27 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r0, 0x0, 0x4) 18:24:27 executing program 4: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:24:27 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast1, 0x0, 0x1000000, 'none\x00'}, 0x2c) 18:24:27 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 767.837223][T30946] IPVS: ftp: loaded support on port[0] = 21 [ 767.846640][T30947] IPVS: ftp: loaded support on port[0] = 21 [ 767.863978][T30952] ptrace attach of "/root/syz-executor.4"[30949] was attempted by "/root/syz-executor.4"[30952] 18:24:27 executing program 4: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:24:27 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:27 executing program 4: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r1, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 768.045224][T30996] ptrace attach of "/root/syz-executor.4"[30986] was attempted by "/root/syz-executor.4"[30996] 18:24:27 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:27 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 768.191152][T31014] ptrace attach of "/root/syz-executor.4"[31013] was attempted by "/root/syz-executor.4"[31014] 18:24:27 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) [ 768.273642][T30946] IPVS: ftp: loaded support on port[0] = 21 [ 768.438698][T30947] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 18:24:30 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:30 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 770.892398][T31061] IPVS: ftp: loaded support on port[0] = 21 18:24:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) [ 770.939433][T31065] IPVS: ftp: loaded support on port[0] = 21 18:24:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 771.492064][T31061] IPVS: ftp: loaded support on port[0] = 21 18:24:33 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:33 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:33 executing program 2: unshare(0x48000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:33 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) [ 773.947972][T31173] IPVS: ftp: loaded support on port[0] = 21 [ 773.960217][T31177] IPVS: ftp: loaded support on port[0] = 21 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) [ 774.537771][T31177] IPVS: ftp: loaded support on port[0] = 21 18:24:36 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) 18:24:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:36 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r1, 0x0, 0x4) [ 777.060597][T31276] IPVS: ftp: loaded support on port[0] = 21 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:36 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001580)='/proc/capi/capi20\x00', 0x240, 0x0) 18:24:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:39 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x100, @remote, 'geneve0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 18:24:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:39 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r2, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80) sendmsg$can_bcm(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x48}}, 0x0) 18:24:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:42 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:42 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r3, 0x2}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f00000000c0)={r3, 0xc}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000080)={r3, 0x10}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x1, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000000)={'veth1_virt_wifi\x00', 0x9}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) 18:24:42 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100), 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:45 executing program 1: 18:24:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100), 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/94, 0x5e) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @local, 0x0, 0xfffffffd, 'none\x00', 0xb}, 0x2c) 18:24:45 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:45 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100), 0x0) write$UHID_DESTROY(r2, 0x0, 0x4) [ 786.459398][T31431] IPVS: ftp: loaded support on port[0] = 21 18:24:45 executing program 1: 18:24:45 executing program 1: 18:24:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{0x0}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:46 executing program 1: 18:24:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{0x0}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{0x0}], 0x1) write$UHID_DESTROY(r2, 0x0, 0x4) 18:24:46 executing program 1: [ 787.124146][T31431] IPVS: ftp: loaded support on port[0] = 21 18:24:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 787.358320][ T182] tipc: TX() has been purged, node left! [ 787.373897][ T182] tipc: TX() has been purged, node left! 18:24:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) [ 787.528381][ T182] tipc: TX() has been purged, node left! [ 787.668054][ T182] tipc: TX() has been purged, node left! [ 787.847782][ T182] tipc: TX() has been purged, node left! [ 788.007793][ T182] tipc: TX() has been purged, node left! [ 788.167811][ T182] tipc: TX() has been purged, node left! [ 788.357857][ T182] tipc: TX() has been purged, node left! [ 788.527850][ T182] tipc: TX() has been purged, node left! [ 788.697760][ T182] tipc: TX() has been purged, node left! [ 788.887749][ T182] tipc: TX() has been purged, node left! [ 789.047731][ T182] tipc: TX() has been purged, node left! [ 789.207753][ T182] tipc: TX() has been purged, node left! [ 789.367978][ T182] tipc: TX() has been purged, node left! 18:24:48 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x2) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x81, 0x6, 0x8, 0x2, 0xfff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000080)={0x4, 0x5, 0xefc, 0x4, 0x400, 0xa4, 0xc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:48 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:48 executing program 1: 18:24:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) 18:24:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:48 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) sendfile(r1, r0, 0x0, 0x20000000000000da) dup2(r0, r1) 18:24:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x1c3002, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/56, 0x38}], 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x4) [ 789.527825][ T182] tipc: TX() has been purged, node left! 18:24:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4cb, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000003c0)={0x5, {{0xa, 0x4e23, 0x3, @loopback, 0x1}}, 0x1, 0x2, [{{0xa, 0x4e21, 0xade, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x20, @mcast2, 0x2}}]}, 0x190) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) [ 789.669310][ T182] tipc: TX() has been purged, node left! [ 789.831396][ T182] tipc: TX() has been purged, node left! 18:24:49 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40080, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x230, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6c9b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0x148, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf5e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdaf}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_NAME={0x12, 0x1, @l2={'ib', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010102}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @remote, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @empty, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2e}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x14}, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffc07}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x1}, 0x20048800) [ 789.955615][T31553] IPVS: ftp: loaded support on port[0] = 21 [ 789.978357][ T182] tipc: TX() has been purged, node left! [ 789.989058][ T182] tipc: TX() has been purged, node left! [ 790.008599][ T182] tipc: TX() has been purged, node left! [ 790.177721][ T182] tipc: TX() has been purged, node left! [ 790.177817][T31553] IPVS: ftp: loaded support on port[0] = 21 [ 790.219496][ T182] tipc: TX() has been purged, node left! 18:24:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 790.268151][ T182] tipc: TX() has been purged, node left! [ 790.281620][ T182] tipc: TX() has been purged, node left! [ 790.300589][ T182] tipc: TX() has been purged, node left! [ 790.325663][ T182] tipc: TX() has been purged, node left! [ 790.352427][ T182] tipc: TX() has been purged, node left! 18:24:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendmmsg(r0, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYRESHEX], 0xf8}}], 0x2, 0x0) [ 790.375342][ T182] tipc: TX() has been purged, node left! 18:24:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 790.567899][ T182] tipc: TX() has been purged, node left! [ 790.690626][ T182] tipc: TX() has been purged, node left! [ 790.817675][ T182] tipc: TX() has been purged, node left! [ 790.947712][ T182] tipc: TX() has been purged, node left! [ 791.127634][ T182] tipc: TX() has been purged, node left! [ 791.297616][ T182] tipc: TX() has been purged, node left! [ 791.487575][ T182] tipc: TX() has been purged, node left! [ 791.667669][ T182] tipc: TX() has been purged, node left! [ 791.827779][ T182] tipc: TX() has been purged, node left! [ 791.997550][ T182] tipc: TX() has been purged, node left! [ 792.157591][ T182] tipc: TX() has been purged, node left! [ 792.327537][ T182] tipc: TX() has been purged, node left! 18:24:51 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x1}, 0x2c) 18:24:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4068aea3, &(0x7f0000000080)={0x94}) dup2(r5, r4) 18:24:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x8) 18:24:51 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:51 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSIGACCEPT(r0, 0x5608, 0x8) [ 792.487646][ T182] tipc: TX() has been purged, node left! 18:24:51 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 792.566902][T31627] IPVS: ftp: loaded support on port[0] = 21 18:24:51 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'vlan1\x00', 0x0}) sendmmsg(r0, &(0x7f0000003fc0)=[{{&(0x7f0000000480)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f0000004140)=ANY=[], 0x238}}], 0x1, 0x0) 18:24:51 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x141042, 0x0) write$FUSE_POLL(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@loopback}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x85e, 0x68}) accept4$bt_l2cap(r1, &(0x7f0000000000), &(0x7f00000000c0)=0xe, 0x80000) 18:24:52 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 792.647539][ T182] tipc: TX() has been purged, node left! [ 792.663881][ T182] tipc: TX() has been purged, node left! [ 792.687249][ T182] tipc: TX() has been purged, node left! 18:24:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0) [ 792.763630][ T182] tipc: TX() has been purged, node left! [ 792.936048][ T182] tipc: TX() has been purged, node left! [ 793.063142][T31627] IPVS: ftp: loaded support on port[0] = 21 [ 793.100415][ T182] tipc: TX() has been purged, node left! [ 793.178681][ T182] tipc: TX() has been purged, node left! [ 793.185021][ T182] tipc: TX() has been purged, node left! [ 793.210167][ T182] tipc: TX() has been purged, node left! 18:24:52 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:52 executing program 3: pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='binfmt_misc\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 793.377478][ T182] tipc: TX() has been purged, node left! [ 793.537690][ T182] tipc: TX() has been purged, node left! [ 793.737928][ T182] tipc: TX() has been purged, node left! [ 793.907432][ T182] tipc: TX() has been purged, node left! [ 794.097477][ T182] tipc: TX() has been purged, node left! [ 794.257507][ T182] tipc: TX() has been purged, node left! [ 794.437407][ T182] tipc: TX() has been purged, node left! [ 794.617570][ T182] tipc: TX() has been purged, node left! [ 794.787569][ T182] tipc: TX() has been purged, node left! [ 794.947631][ T182] tipc: TX() has been purged, node left! [ 795.107450][ T182] tipc: TX() has been purged, node left! [ 795.277407][ T182] tipc: TX() has been purged, node left! [ 795.457368][ T182] tipc: TX() has been purged, node left! 18:24:54 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:54 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000009, 0x100010, r1, 0x7bfff000) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x2b, @multicast1, 0x0, 0x0, 'none\x00', 0x0, 0x3}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x7d8840, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x208000, 0x0) ioctl$SIOCX25SENDCALLACCPT(r6, 0x89e9) ioctl$SNDRV_PCM_IOCTL_DELAY(r4, 0x80084121, &(0x7f0000000000)) open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x40) 18:24:54 executing program 3: pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)='binfmt_misc\x00', 0x0, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 18:24:54 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x141042, 0x0) write$FUSE_POLL(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@loopback}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x85e, 0x68}) accept4$bt_l2cap(r1, &(0x7f0000000000), &(0x7f00000000c0)=0xe, 0x80000) 18:24:54 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 795.617456][ T182] tipc: TX() has been purged, node left! [ 795.640992][T31732] IPVS: ftp: loaded support on port[0] = 21 [ 795.673876][T31736] IPVS: set_ctl: invalid protocol: 43 224.0.0.1:0 18:24:55 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x141042, 0x0) write$FUSE_POLL(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@loopback}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x3, 0x85e, 0x68}) accept4$bt_l2cap(r1, &(0x7f0000000000), &(0x7f00000000c0)=0xe, 0x80000) [ 795.728268][ T182] tipc: TX() has been purged, node left! [ 795.734543][ T182] tipc: TX() has been purged, node left! [ 795.769637][ T182] tipc: TX() has been purged, node left! [ 795.795424][ T182] tipc: TX() has been purged, node left! [ 795.853356][T31732] IPVS: ftp: loaded support on port[0] = 21 [ 795.903004][T31768] IPVS: set_ctl: invalid protocol: 43 224.0.0.1:0 [ 795.928851][ T182] tipc: TX() has been purged, node left! [ 795.935628][ T182] tipc: TX() has been purged, node left! 18:24:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x3c, @multicast1, 0x4e23, 0x0, 'none\x00'}, 0x2c) [ 795.953103][ T182] tipc: TX() has been purged, node left! [ 795.975311][ T182] tipc: TX() has been purged, node left! [ 796.101372][T31793] IPVS: ftp: loaded support on port[0] = 21 [ 796.167893][ T182] tipc: TX() has been purged, node left! [ 796.178582][ T182] tipc: TX() has been purged, node left! [ 796.270388][ T182] tipc: TX() has been purged, node left! [ 796.397322][ T182] tipc: TX() has been purged, node left! 18:24:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 796.527809][T31793] IPVS: set_ctl: invalid protocol: 60 224.0.0.1:20003 [ 796.556522][T31793] IPVS: ftp: loaded support on port[0] = 21 18:24:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000040)) [ 796.588308][ T182] tipc: TX() has been purged, node left! [ 796.619042][ T182] tipc: TX() has been purged, node left! 18:24:55 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) clock_gettime(0x1, &(0x7f00000000c0)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000200)={0x3f, {{0x2, 0x4e20, @loopback}}, 0x1, 0x6, [{{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x0, @local}}, {{0x2, 0x4e21, @local}}]}, 0x390) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000080)={{r1, r2/1000+10000}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') pipe2$9p(&(0x7f0000000000), 0x800) [ 796.645126][ T182] tipc: TX() has been purged, node left! [ 796.683086][ T182] tipc: TX() has been purged, node left! 18:24:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0xcc) [ 796.712964][ T182] tipc: TX() has been purged, node left! [ 796.732776][ T182] tipc: TX() has been purged, node left! [ 796.775938][ T27] audit: type=1800 audit(1588703096.051:18): pid=31851 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16384 res=0 [ 796.911295][ T182] tipc: TX() has been purged, node left! [ 797.017309][ T182] tipc: TX() has been purged, node left! [ 797.187562][ T182] tipc: TX() has been purged, node left! [ 797.358571][ T182] tipc: TX() has been purged, node left! [ 797.527329][ T182] tipc: TX() has been purged, node left! [ 797.707256][ T182] tipc: TX() has been purged, node left! [ 797.877206][ T182] tipc: TX() has been purged, node left! [ 798.067369][ T182] tipc: TX() has been purged, node left! [ 798.227250][ T182] tipc: TX() has been purged, node left! [ 798.397282][ T182] tipc: TX() has been purged, node left! 18:24:57 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:24:57 executing program 2: unshare(0x40000000) mmap(&(0x7f0000084000/0x1000)=nil, 0x1000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x2) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) 18:24:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}], {0x14}}, 0x58}}, 0x0) 18:24:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:24:57 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 798.557214][ T182] tipc: TX() has been purged, node left! 18:24:58 executing program 3: r0 = eventfd(0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'ip6gretap0\x00', 0x2}) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f00000000c0)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 18:24:58 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) r2 = dup2(r1, r0) getrandom(&(0x7f0000000700)=""/4096, 0x1000, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x0) [ 798.667575][ T182] tipc: TX() has been purged, node left! [ 798.683224][ T182] tipc: TX() has been purged, node left! [ 798.683762][T31876] IPVS: ftp: loaded support on port[0] = 21 [ 798.748916][ T182] tipc: TX() has been purged, node left! [ 798.777840][ T182] tipc: TX() has been purged, node left! [ 798.794431][T31876] IPVS: ftp: loaded support on port[0] = 21 18:24:58 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) write$P9_RCLUNK(r0, 0x0, 0x0) 18:24:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r2}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e1800002d00050fd25a80648c63940d0e24fc60100002400a000200051a82c137153e670402098003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 798.870088][ T182] tipc: TX() has been purged, node left! [ 798.880576][ T182] tipc: TX() has been purged, node left! [ 798.903776][ T182] tipc: TX() has been purged, node left! [ 798.931591][ T182] tipc: TX() has been purged, node left! 18:24:58 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0xca26a000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:24:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) write$tun(r0, &(0x7f0000000180)={@void, @val, @mpls={[], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x33, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {{0x0, 0x0, 0x1, 0x0, 0x2}}}}}, 0x62) [ 799.068143][T31945] IPVS: ftp: loaded support on port[0] = 21 [ 799.107339][ T182] tipc: TX() has been purged, node left! [ 799.785088][T31945] IPVS: ftp: loaded support on port[0] = 21 18:25:00 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x0, 0x0, 0x2}, @mpls={[], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x4305, 0x5, 0x0, [], "67cb0021e5"}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "77badc74"}}}}}, 0xfdef) 18:25:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:00 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x14, 0x81, 0x9, 0xb, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}, @sadb_lifetime={0x4, 0x4, 0x2, 0x8001, 0x9, 0xfffffffffffffffd}, @sadb_lifetime={0x4, 0x3, 0x0, 0x3f, 0x8, 0x8}]}, 0x58}}, 0x8001) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000001c0)=0x4, 0x4) recvfrom(r0, &(0x7f0000000100)=""/94, 0xffffffffffffff5e, 0x0, 0x0, 0x0) 18:25:00 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 801.709073][T32015] IPVS: ftp: loaded support on port[0] = 21 [ 801.714210][T32019] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 801.728191][T32016] dccp_invalid_packet: P.Data Offset(0) too small [ 802.057103][T32015] IPVS: ftp: loaded support on port[0] = 21 [ 802.199839][T32075] dccp_invalid_packet: P.Data Offset(0) too small 18:25:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x9116a000) socket$inet(0x2b, 0x1, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @remote, 0x0, 0x0, 'lc\x00', 0x1b, 0x200000, 0x79}, 0x2c) [ 802.442693][T32082] IPVS: ftp: loaded support on port[0] = 21 18:25:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:01 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x20, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}}, 0x0) 18:25:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="24000000070601040000000000ef00000000000008000640000903ff0500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 18:25:01 executing program 1: 18:25:01 executing program 1: [ 802.726481][ T27] audit: type=1804 audit(1588703102.002:19): pid=32114 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir669089579/syzkaller.Wr2NKJ/743/cgroup.controllers" dev="sda1" ino=16384 res=1 [ 802.900996][T32082] IPVS: ftp: loaded support on port[0] = 21 18:25:04 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:04 executing program 1: 18:25:04 executing program 3: 18:25:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000080)={0x0, 0x200, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98091c, 0x3, [], @ptr=0x66b6}}) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$dsp(r4, &(0x7f0000000000)="40c07123efa5026c549f6d48bccf153f83bbd867776d653f4e97c71174ec", 0x1e) r5 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:04 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:04 executing program 3: 18:25:04 executing program 1: [ 804.805115][T32161] IPVS: ftp: loaded support on port[0] = 21 18:25:04 executing program 3: 18:25:04 executing program 1: 18:25:04 executing program 1: 18:25:04 executing program 3: [ 805.192075][T32161] IPVS: ftp: loaded support on port[0] = 21 18:25:07 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:07 executing program 1: 18:25:07 executing program 3: 18:25:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:07 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:07 executing program 1: 18:25:07 executing program 3: 18:25:07 executing program 1: 18:25:07 executing program 3: 18:25:07 executing program 1: 18:25:07 executing program 3: 18:25:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x178, 0x178, 0x178, 0x0, 0x178, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0x158, 0x178, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c", 0x47, 0x2}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 808.246981][T32254] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 808.272288][T32254] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 18:25:10 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @local}}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(r0, &(0x7f0000000240)={@void, @val, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x84, 0x0, @dev, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x0, "c80005"}}}}}, 0x2e) 18:25:10 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65312c6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65302c696e6465783d6f6e2c00831f19977f59f1b5ae424f1022fc442c4e271351e06cb18b58f22605aa775b56b8ed1286350324b7a22d41ffe7663f75ef698790251c6a6e9ede1333269a9c55540366293d25d77bfb71d0288b5b433dc9cc10823588236a8d605825175969221e5d5c2ea273ff88fc1168a100a1dab02b805fe0fd9905b5ac17d0fb7dbffdd9fdf5ca0d5dd7dd09ca"]) llistxattr(0x0, &(0x7f0000000280)=""/183, 0xb7) socket(0x0, 0x0, 0x0) chown(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 18:25:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:10 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 810.936194][T32267] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 811.044101][T32269] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 18:25:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000000c0)={[], [{@fscontext={'fscontext', 0x3d, 'root'}, 0x22}, {@appraise='appraise'}], 0x2c}) 18:25:10 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = gettid() tkill(r1, 0x33) tgkill(r0, r1, 0x0) [ 811.295964][T32288] overlayfs: unrecognized mount option "fscontext=root"appraise" or missing value [ 811.318217][T32290] overlayfs: unrecognized mount option "fscontext=root"appraise" or missing value 18:25:10 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f00000001c0)='*\x8e\xc8\xe6', 0x4, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', 0x0, 0x0) 18:25:10 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 811.600348][T32304] device vlan0 left promiscuous mode 18:25:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 811.954883][T32306] device vlan0 entered promiscuous mode [ 812.351632][T31338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 812.363555][T32304] device vlan0 left promiscuous mode [ 812.524604][T32315] device vlan0 entered promiscuous mode 18:25:11 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 18:25:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 813.326175][T32323] device vlan0 left promiscuous mode [ 813.629708][T32326] device vlan0 entered promiscuous mode 18:25:13 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:13 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 18:25:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000500)=[@in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @private=0xa010100}, 0x3ff}], 0x1c) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000540)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000580)={r4}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40, 0x0) sendmsg$rds(r5, &(0x7f0000000480)={&(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/196, 0xc4}, {&(0x7f00000002c0)=""/156, 0x9c}], 0x2, &(0x7f0000000400)}, 0x24000044) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(r6, 0x4068aea3, &(0x7f0000000000)={0x3e290163e10f9f62, 0x0, [0x800, 0x1, 0x7, 0x100000000]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$sock_void(r8, 0x1, 0x3f, 0x0, 0x0) 18:25:13 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 18:25:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:13 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 814.091519][T32353] device vlan0 left promiscuous mode [ 814.105472][T32354] IPVS: ftp: loaded support on port[0] = 21 [ 814.581188][T32357] device vlan0 entered promiscuous mode [ 814.634857][T32359] device vlan0 entered promiscuous mode 18:25:14 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000040)=0x2) 18:25:14 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 814.754270][T32358] IPVS: ftp: loaded support on port[0] = 21 [ 814.777890][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 18:25:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 814.890783][T32388] device vlan0 left promiscuous mode 18:25:14 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x94, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f043051fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108098da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\'eth0@cpusetposix_acl_access$!\x00') write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x13, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 815.257825][T32390] device vlan0 entered promiscuous mode 18:25:14 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r2 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 815.480422][T32425] device vlan0 left promiscuous mode 18:25:14 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x2000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 815.599888][T32431] IPVS: ftp: loaded support on port[0] = 21 [ 815.724203][T32429] device vlan0 entered promiscuous mode [ 815.896546][T31340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 815.960769][T32431] IPVS: ftp: loaded support on port[0] = 21 18:25:16 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f0600000000000000", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:16 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000040)='.request_key_auth\x00', 0x0, 0x0) 18:25:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:16 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:16 executing program 2: unshare(0x40000000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400400, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x9c, 0x7, 0x1, 0x1f, 0x7, 0x81, 0x9, 0xe3, 0x20, 0x1, 0xd6, 0x7f}, 0xe) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x800, 0x2) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, &(0x7f0000000080)=0x4) 18:25:16 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:16 executing program 1: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) [ 817.033267][T32491] device vlan0 left promiscuous mode [ 817.033964][T32492] IPVS: ftp: loaded support on port[0] = 21 18:25:16 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 18:25:16 executing program 1: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 18:25:16 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) [ 817.503715][T32492] IPVS: ftp: loaded support on port[0] = 21 18:25:16 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) 18:25:16 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockname$unix(r0, 0x0, 0x0) 18:25:19 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:19 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x11, &(0x7f0000000080)={r3}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r3, 0x1, 0x2, [0x101, 0x7]}, &(0x7f0000000040)=0xc) 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') setxattr$security_ima(0x0, &(0x7f0000000e00)='security.ima\x00', &(0x7f0000000e40)=@sha1={0x1, "8b7bccaf018c6c1d5f266830539019eb19555cec"}, 0x15, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000100)={'rose0\x00', @ifru_flags=0x2}}) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000000)='syz_tun\x00', &(0x7f00000000c0)) socket$inet(0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 18:25:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 820.053075][T32584] IPVS: ftp: loaded support on port[0] = 21 18:25:19 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp\x00') bind(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) socket$inet6(0xa, 0x0, 0x2f) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3ce}}], 0x69f, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$smc(0x0) socket(0x0, 0x0, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) getpeername$unix(r2, &(0x7f0000000000), &(0x7f00000002c0)=0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x20000880) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="98000000", @ANYRES16=r3, @ANYBLOB="000026bd7000fe0000000100000070000380060007004e200000060004000000000014000600fe80000000000000000000000000003b14000600000000000000000000000000000000010800010001000000140002006e657470636930000000000000000000050008007f000000060004000000000004000280080005004000000008000400ff0100"/146], 0x98}}, 0x40000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 820.518094][T32584] IPVS: ftp: loaded support on port[0] = 21 18:25:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:22 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xffffc000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:22 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') setxattr$security_ima(&(0x7f0000000d80)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000e00)='security.ima\x00', &(0x7f0000000e40)=@sha1={0x1, "8b7bccaf018c6c1d5f266830539019eb19555cec"}, 0x15, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)=[{{&(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000340)="c76150edf36cb16dfb33b57aa99fb676268b1e2a14907cc6b4d24467309b2a2fa8827dcded1b7c2347c867d5fbb2689eef90ea39721c220924eda467bcde264c49ee4369878988e9f54a5cab26f1bb0c7323b35613f2219874b81754bfa79aab94670ee527cdaa366d9b4e6766aa964c2ffea231fdce6bb4574c1c09631ec7e71303384e40830d8e6bdcb8f79fa5512946f9b28cf0664e0ebaaff941072698a8a495bee27d4be89754cb48c39a2ab790", 0xb0}, {&(0x7f0000000400)="706679327b1a0e8e967062c9f7b6daec97fcb851688b64038bc1b5261138b3f48cdcafba2642ecb559a874cea2ca58b79a426ec1f4de980074db4cb800dbfde44dbf1cb8a0ede91edd17f2479cb39f641bef2209c0c87aec97b1854940d6d66902f4465d35f5781239f724c090d89db96bd3e64afc71291e9ea686c81f8daffd4d2e836c88105cd85799f953b56a8f4539d5571c093d40a66f7e3a7299c16d67a1c06b3adb7b51c1504cf27862ae24c07d6dd450c82570cb1b1d6886a33d7a90cdebc3fcf0d15500e2fbef4b1bb65a262e94c4d9798931a94d3b76ff3a07cb47a9731d059dfe7bda30d8f047", 0xec}, {&(0x7f0000000500)="fa1ed4282daebc2f7b7adac879af31bfbb693b3fabfad10a3354c09279d12488969caf54e86ce501c2e2ac1cb9acb564193d50c3e7ff0687aa0d41ffed5595e292acf35adb536a541aa8bec1a62d016eb08ed25917156e718d788a391e7094b9e564f946cbefb7b29ad9c55c8a9e8438017f2042bc0e6d4fb1b98c01dd362dc2e08e6b82f975", 0x86}, {&(0x7f00000005c0)="ca8db8ecd965644d59d121204b579def9e80dd9527178c6dea9c9a9596c1119dc41eba72ce49f636859d3d14449c675e7ff6cfea3afa115b5b0e72d8360f30cc6bef03699eedcd4ed50ee99b059a6ad7fbb647982f25ba", 0x57}, {&(0x7f0000000640)="68e643b9382afc94638d3aaba194984ab7cefe672e99662b61c248284a35ce33fc06fae75b27002193fdbaf9d9dc0e10f5c1a267d3833a2174740e163fa4e336e57618951f719afe56dea9cfc7b9946b1a0940b8020b26007304ccb0eeb35ac05e5253dbbe7f4ab39228334e486f821341689603649522cf576a4bc3c0512edabbf06be0b63427a342ca437a81294bdd2bc2e6fe46480b3b8f54407971d0fe3771ab487270da736eb21316ea214ebd3d25a93c62281bff3f5b5ab7321cfe8fc79316fee35711caea39dd7124fbd92d06543a827fe0efb5b66657266eae1126a7a6", 0xe1}, {&(0x7f0000000800)="1063134fa26ba7ceae226ac48fb093423ca73821bb58e60c2eb9087d827e6725de2307770154f1f7a0918fc3f5e718f8caf1db69f067c10c3e0d9e18a09efb84b690ecf53a6dd7814ca9ab73f39af6acdeba5749e361bde71232eea0a3a718b188", 0x61}, {&(0x7f0000000740)="c21f70b1d01c7e1c725c08a9f87ccd4117187914907dd0d9c1e6895c26e2abd0", 0x20}, {0x0}], 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x1b8}}], 0x1, 0x4044005) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000100)={'rose0\x00', @ifru_flags=0x2}}) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) r0 = socket(0x2, 0x2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000000)='syz_tun\x00', &(0x7f00000000c0)) ioctl$sock_SIOCETHTOOL(r0, 0x8919, &(0x7f0000000040)={'syz_tun\x00', 0x0}) socket$inet(0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') [ 823.138546][T32687] IPVS: ftp: loaded support on port[0] = 21 18:25:22 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:22 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') setxattr$security_ima(&(0x7f0000000d80)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000e00)='security.ima\x00', &(0x7f0000000e40)=@sha1={0x1, "8b7bccaf018c6c1d5f266830539019eb19555cec"}, 0x15, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)=[{{&(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000ac0)=[{&(0x7f0000000340)="c76150edf36cb16dfb33b57aa99fb676268b1e2a14907cc6b4d24467309b2a2fa8827dcded1b7c2347c867d5fbb2689eef90ea39721c220924eda467bcde264c49ee4369878988e9f54a5cab26f1bb0c7323b35613f2219874b81754bfa79aab94670ee527cdaa366d9b4e6766aa964c2ffea231fdce6bb4574c1c09631ec7e71303384e40830d8e6bdcb8f79fa5512946f9b28cf0664e0ebaaff941072698a8a495bee27d4be89754cb48c39a2ab790", 0xb0}, {&(0x7f0000000400)="706679327b1a0e8e967062c9f7b6daec97fcb851688b64038bc1b5261138b3f48cdcafba2642ecb559a874cea2ca58b79a426ec1f4de980074db4cb800dbfde44dbf1cb8a0ede91edd17f2479cb39f641bef2209c0c87aec97b1854940d6d66902f4465d35f5781239f724c090d89db96bd3e64afc71291e9ea686c81f8daffd4d2e836c88105cd85799f953b56a8f4539d5571c093d40a66f7e3a7299c16d67a1c06b3adb7b51c1504cf27862ae24c07d6dd450c82570cb1b1d6886a33d7a90cdebc3fcf0d15500e2fbef4b1bb65a262e94c4d9798931a94d3b76ff3a07cb47a9731d059dfe7bda30d8f047", 0xec}, {&(0x7f0000000500)="fa1ed4282daebc2f7b7adac879af31bfbb693b3fabfad10a3354c09279d12488969caf54e86ce501c2e2ac1cb9acb564193d50c3e7ff0687aa0d41ffed5595e292acf35adb536a541aa8bec1a62d016eb08ed25917156e718d788a391e7094b9e564f946cbefb7b29ad9c55c8a9e8438017f2042bc0e6d4fb1b98c01dd362dc2e08e6b82f975", 0x86}, {&(0x7f00000005c0)="ca8db8ecd965644d59d121204b579def9e80dd9527178c6dea9c9a9596c1119dc41eba72ce49f636859d3d14449c675e7ff6cfea3afa115b5b0e72d8360f30cc6bef03699eedcd4ed50ee99b059a6ad7fbb647982f25ba", 0x57}, {&(0x7f0000000640)="68e643b9382afc94638d3aaba194984ab7cefe672e99662b61c248284a35ce33fc06fae75b27002193fdbaf9d9dc0e10f5c1a267d3833a2174740e163fa4e336e57618951f719afe56dea9cfc7b9946b1a0940b8020b26007304ccb0eeb35ac05e5253dbbe7f4ab39228334e486f821341689603649522cf576a4bc3c0512edabbf06be0b63427a342ca437a81294bdd2bc2e6fe46480b3b8f54407971d0fe3771ab487270da736eb21316ea214ebd3d25a93c62281bff3f5b5ab7321cfe8fc79316fee35711caea39dd7124fbd92d06543a827fe0efb5b66657266eae1126a7a6", 0xe1}, {&(0x7f0000000800)="1063134fa26ba7ceae226ac48fb093423ca73821bb58e60c2eb9087d827e6725de2307770154f1f7a0918fc3f5e718f8caf1db69f067c10c3e0d9e18a09efb84b690ecf53a6dd7814ca9ab73f39af6acdeba5749e361bde71232eea0a3a718b188", 0x61}, {&(0x7f0000000740)="c21f70b1d01c7e1c725c08a9f87ccd4117187914907dd0d9c1e6895c26e2abd0", 0x20}, {0x0}], 0x8, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x1b8}}], 0x1, 0x4044005) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000100)={'rose0\x00', @ifru_flags=0x2}}) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) r0 = socket(0x2, 0x2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000000)='syz_tun\x00', &(0x7f00000000c0)) ioctl$sock_SIOCETHTOOL(r0, 0x8919, &(0x7f0000000040)={'syz_tun\x00', 0x0}) socket$inet(0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 18:25:22 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:22 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 823.581505][T32687] IPVS: ftp: loaded support on port[0] = 21 [ 823.643196][T32753] dns_resolver: Unsupported server list version (0) 18:25:25 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcf", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:25 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:25 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000040), 0x4) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = fcntl$dupfd(r0, 0x80c, r1) write$vhci(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xe4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="00feffffff00000036499017010000020000000000020021d5c1799c89549f5122036c475140e086363dad5e055704d62348921bab0000790a760ecea3df707d55c73c0aafcbafe4ab8818f6618e7528d614fb6b3326be5e6d71794d38df3025ecd9af20a5d8034714510bf1768e7bca5c8d409b1a14114a91d4fcf7071771348e061c598540e7a33cff0f0c93875220b550628ff9b735f82cfedeb2d7a5b732aa768bb7f860b134aca468a4a232d207aebc3099a69aa869ff8c0e0272a1eba0cea4dbb6372b07e925dc0db9c61dbea12a39901cc65093475c03eda81e7adc0ed314f9635b0c90bf31562422360b16c478041eef326335d97b01be0f364ffcc72bac90e085591a2258a56d4ba628fb7ce78dfc4dc4cb4739a2e81a3fef00ac7291d56f78384a0760f0d1c993269de3638cd95ff79979d4a7321e56bc5c57988e81541c9102f93106a02922e85592f8636ab99d5b331e136cd5f3ffefa3c7155c4f5cfa35f72c97ec40dcc2f609eb63d8008cb336b472c3a3cc7a9158581532864aba4ca4e081631e9f7f1367ca2f592b93811a6cb3d837d9efbbcbf7d062be0e2bbbbe213da6f0cc2c8ee39226f472cc299f87b84b97f8a73f25a15d2afe54f73e90d60a4e0ac57034e7dfebdf3e0d1d4bed87f2c29a29a084a742eb782969dc9134fa3019e7c5d39b37474a0e482679185a275e4dd9b0b6798381d700d738e77d8edb1e00"/533], 0x21b, 0x40}], 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x101442, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@initdev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000100)=0xe8) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x20010, r3, 0x8516a000) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x4206, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'bond_slave_0\x00', {}, 0x100}) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) 18:25:25 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x300, 0x70bd27, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}}, 0x40) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 826.179445][ T313] fuse: Bad value for 'fd' [ 826.187141][ T309] IPVS: ftp: loaded support on port[0] = 21 18:25:25 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:25 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:25 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 826.395392][ T338] fuse: Bad value for 'fd' 18:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:25 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 826.513101][ T354] fuse: Bad value for 'fd' 18:25:25 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000040), 0x4) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = fcntl$dupfd(r0, 0x80c, r1) write$vhci(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="03d62fba3a7695c419e84eecd937dae4eb18949d0100bbeb7b008000000000661881627771e4dc6fc5d1b4b71846260cc2ff133b875b9dc1070000009f0d1689ec0fe480a6396192b8561f36410701e662196deede5b41c2e76966e9ea775f922cae98f45c491b60d0654346aa74f1d020d00eeb0b43867e9d78e2e26a23df39d8753d68d4f5ddacb48862441fdef999b0d7c49c487be55c82d7c5726a5070b219ddc73f204a66877479f1e1392ec23a50f4e59ebc5e17d93a6dfc2a6e1c907695b9ba24a8043f2f56e347c77ae92b022ed4b5de379a4cd1ba6b89f68192733ceef354eb659bf6407721bbf2349329c1777a4fbf8e2d50c8f6d37ff5360e5f2df2c2b65c56cbdbfa8b96ff7e0f5888883c45b72e2bb41c6b691f364ef510daee1afab606341262ab139842cfde806d019ebee595acf38000d2c8d84629"], 0xe4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/533], 0x21b, 0x40}], 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x101442, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@initdev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000100)=0xe8) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x20010, r3, 0x8516a000) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x4206, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'bond_slave_0\x00', {}, 0x100}) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) [ 826.637224][ T359] debugfs: File 'dropped' in directory 'loop0' already present! [ 826.659805][ T359] debugfs: File 'msg' in directory 'loop0' already present! [ 826.684817][ T359] debugfs: File 'trace0' in directory 'loop0' already present! [ 826.691050][ T309] IPVS: ftp: loaded support on port[0] = 21 18:25:28 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:28 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:28 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:28 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000040), 0x4) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = fcntl$dupfd(r0, 0x80c, r1) write$vhci(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xe4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/533], 0x21b, 0x40}], 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x101442, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@initdev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000100)=0xe8) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x20010, r3, 0x8516a000) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x4206, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'bond_slave_0\x00', {}, 0x100}) r6 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) [ 829.235942][ T393] debugfs: File 'dropped' in directory 'loop0' already present! [ 829.245113][ T394] IPVS: ftp: loaded support on port[0] = 21 18:25:28 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:28 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 829.278747][ T393] debugfs: File 'msg' in directory 'loop0' already present! 18:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 829.322936][ T393] debugfs: File 'trace0' in directory 'loop0' already present! 18:25:28 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000b0001006d756c7469710000080002"], 0x38}}, 0x0) 18:25:28 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 829.730143][ T394] IPVS: ftp: loaded support on port[0] = 21 18:25:31 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:31 executing program 1: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) readv(r2, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x5) dup3(r1, r2, 0x0) 18:25:31 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:31 executing program 2: unshare(0x40000000) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x169a0000) r0 = socket$inet(0x2b, 0x1, 0x0) accept4(r0, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80, 0x80800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvram\x00', 0x204000, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast2, 0x0, 0x1, 'none\x00', 0xa, 0x5, 0x58}, 0x2c) [ 832.327020][ T481] IPVS: ftp: loaded support on port[0] = 21 18:25:31 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:31 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:31 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:31 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:31 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 832.813993][ T481] IPVS: ftp: loaded support on port[0] = 21 18:25:34 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) r3 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x7, 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:25:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0x2, 0x2969}) r2 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 835.374078][ T567] IPVS: ftp: loaded support on port[0] = 21 18:25:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:34 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 835.884620][ T567] IPVS: ftp: loaded support on port[0] = 21 18:25:37 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:37 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f00000000c0)=0x7, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:25:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x48) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:37 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 838.408137][ T654] IPVS: ftp: loaded support on port[0] = 21 18:25:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:37 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 838.654658][ T691] fuse: Bad value for 'group_id' 18:25:37 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:38 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:38 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 838.842950][ T707] fuse: Bad value for 'group_id' [ 838.981281][ T654] IPVS: ftp: loaded support on port[0] = 21 18:25:40 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) connect$inet(r2, &(0x7f0000000300)={0x2, 0x0, @remote}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 18:25:40 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:40 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:40 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000480)={0x2e, @private=0xa010100, 0x2, 0xffffffff, 'none\x00', 0x49f745d5f8338b14, 0x2, 0x57}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r3], 0x3fffff67}, 0x50) process_vm_writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/28, 0x1c}, {&(0x7f0000000080)=""/47, 0x2f}], 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/147, 0x93}, {&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000340)=""/83, 0x53}], 0x3, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000400)={r6, 0x400, 0x2, 0x0, 0xfffff983, 0x9}, &(0x7f0000000440)=0x14) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000000)={0x19, 0x80, 0xb, 0x4, 0x8001}) 18:25:40 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 841.478956][ T741] IPVS: ftp: loaded support on port[0] = 21 [ 841.508033][ T745] fuse: Bad value for 'group_id' 18:25:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:40 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d010000", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:41 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:41 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:41 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 842.013945][ T741] IPVS: set_ctl: invalid protocol: 46 10.1.1.0:2 [ 842.027676][ T741] IPVS: ftp: loaded support on port[0] = 21 18:25:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)=ANY=[@ANYBLOB="03"]) syz_open_dev$sg(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:25:41 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:41 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x1406, 0x100, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:41 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 842.343004][ T826] IPVS: ftp: loaded support on port[0] = 21 18:25:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB='A'], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 18:25:41 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 842.735247][ T826] IPVS: ftp: loaded support on port[0] = 21 18:25:44 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:44 executing program 1: r0 = getpid() setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x8, 0x3, 0x7a, 0x8, 0x332, 0x6, 0x7fff, 0x6, r0, r1}) sched_setscheduler(r0, 0x5, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000080)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x7, 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:25:44 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:44 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$RTC_PLL_SET(r8, 0x40207012, &(0x7f0000000100)={0x7, 0xc678, 0x3, 0x8, 0x1, 0x509, 0x1f}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000040)={r6}, &(0x7f0000000080)=0x10) mmap(&(0x7f00003f8000/0x3000)=nil, 0x3000, 0x100000b, 0x20010, r1, 0x0) r9 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:44 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:44 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 844.938945][ T905] IPVS: ftp: loaded support on port[0] = 21 18:25:44 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 845.196916][ T905] IPVS: ftp: loaded support on port[0] = 21 [ 845.240562][ T946] fuse: Unknown parameter 'grou00000000000000000000' 18:25:44 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 845.398141][ T966] fuse: Unknown parameter 'grou00000000000000000000' 18:25:47 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:47 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:47 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$rfkill(r1, &(0x7f0000000000), 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000040)=""/130) prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000100850000002c000000950000000000000011cfcde17a1da9ec3c96b09d8466b1ce81d001800000f0fffffc4a50aef8f1817ff82bf00693bcbe1f580390f766064fcc1d6632fccb38f04c2b8f12a953e0b2cd55fcde40043fbe868ed1d87346b1a89d9920625b3dec49b3f04d5be4135308ff3e9ed72d0c158d03140a0c8d885c64a28953c10557a3214c681b747a23f3e32c60a31e509c17c9e8fc0f17700c9e27d8e8878fdb8712ab15d1de5959e48bd7ffb51261cb2bf7f0021b4ee484e944f99f537d2a5f8ed6aa4216ee49d36cc6de5432a63ef7e23b71b30cceed7d935c5dc47068365a00"/264], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x1a0}}]}, {0x4}}}]}]}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x1a0}}]}, {0x4}}}]}]}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=@newtaction={0x14, 0x30, 0x1}, 0x14}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000003000010000000000000000080000000034000100010067616374000000001c000280180002204bc44235a41775e14befedca2c000000000000000000a001000000000000000000000400060000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x1a0}}]}, {0x4}}}]}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000010000108000000060000000000000000", @ANYRES32, @ANYRESOCT=r1, @ANYRESOCT=0x0], 0x34}, 0x1, 0xfcffffff00000000, 0x0, 0x20004004}, 0x10000010) r5 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 18:25:47 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 847.979901][ T989] IPVS: ftp: loaded support on port[0] = 21 [ 847.999098][ T990] fuse: Unknown parameter 'grou00000000000000000000' 18:25:47 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:47 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x390, {0x0, 0x0, 0x0, 0x0, 0x1efc1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000000c0)=""/54) [ 848.249699][ T1023] fuse: Unknown parameter 'group_i00000000000000000000' 18:25:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:47 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 848.471973][ T1038] fuse: Unknown parameter 'group_i00000000000000000000' [ 848.542750][ T1029] device batadv0 entered promiscuous mode [ 848.555377][ T1029] device macvtap1 entered promiscuous mode [ 848.568776][ T1029] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 848.743619][ T1029] syz-executor.1 (1029) used greatest stack depth: 23888 bytes left [ 848.768161][ T989] IPVS: ftp: loaded support on port[0] = 21 18:25:50 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:50 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:50 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @loopback, @empty, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@dev}]}, @timestamp_prespec={0x44, 0x34, 0x0, 0x3, 0x0, [{@remote}, {@loopback}, {@local}, {@private}, {@loopback}, {@loopback}]}]}}}}}}}, 0x0) 18:25:50 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00004a7000/0x2000)=nil, 0x2000, 0x3, 0x100010, r1, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000002070108000000000000000140000010000c00024000000000000000010c0002400000fb000000d7792df694f65663495989f26b2a6018dd82eaa92fc655b4168ae9566337582f714a546581145aa78407d9845b8e1dfd625eca28121af73c87bf3224d106"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x89) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:50 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:50 executing program 3: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 851.049439][ T1080] IPVS: ftp: loaded support on port[0] = 21 [ 851.063284][ T1082] fuse: Unknown parameter 'group_i00000000000000000000' 18:25:50 executing program 1: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 18:25:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:50 executing program 1: 18:25:50 executing program 3: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 851.200111][ T1111] fuse: Unknown parameter 'group_id00000000000000000000' [ 851.231249][ T1080] IPVS: ftp: loaded support on port[0] = 21 18:25:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 851.357493][ T1134] fuse: Unknown parameter 'group_id00000000000000000000' 18:25:53 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:53 executing program 1: 18:25:53 executing program 3: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:53 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x16, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:25:53 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:53 executing program 1: [ 854.063418][ T1166] fuse: Unknown parameter 'group_id00000000000000000000' [ 854.081098][ T1164] IPVS: ftp: loaded support on port[0] = 21 18:25:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:53 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:53 executing program 1: [ 854.262689][ T1187] fuse: Bad value for 'user_id' 18:25:53 executing program 1: 18:25:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 854.415146][ T1208] fuse: Bad value for 'user_id' [ 854.477422][ T1164] IPVS: set_ctl: invalid protocol: 22 224.0.0.1:0 [ 854.498818][ T1164] IPVS: ftp: loaded support on port[0] = 21 18:25:56 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:56 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:56 executing program 1: 18:25:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:56 executing program 2: unshare(0x74020280) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0xfffffffe) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x2, 0x0, 'none\x00', 0x0, 0x4000}, 0x2c) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x100000000, 0x200, 0x3}, 0x6}, 0x20, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4202, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x11, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e20, 0x747, @loopback, 0x101}}, 0x1, 0x20}, 0x90) 18:25:56 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 857.115399][ T1251] fuse: Bad value for 'user_id' 18:25:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:56 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:56 executing program 1: 18:25:56 executing program 1: [ 857.259239][ T1260] fuse: Bad value for 'fd' 18:25:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:56 executing program 3: socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 857.394722][ T1270] fuse: Bad value for 'fd' 18:25:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:59 executing program 1: 18:25:59 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:59 executing program 3: socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:59 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000180)=0x7f, &(0x7f00000001c0)=0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) tee(r4, r1, 0x5, 0x0) r5 = getpid() clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r5], 0x1}, 0x50) waitid(0x0, r5, &(0x7f0000000000), 0x2, &(0x7f0000000080)) 18:25:59 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:25:59 executing program 1: [ 860.126227][ T1283] IPVS: ftp: loaded support on port[0] = 21 18:25:59 executing program 3: socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140)=r0, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:25:59 executing program 1: [ 860.212427][ T1290] fuse: Bad value for 'fd' 18:25:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:25:59 executing program 1: 18:25:59 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 860.381890][ T1321] fuse: Bad value for 'fd' 18:25:59 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 860.555482][ T1283] IPVS: ftp: loaded support on port[0] = 21 18:26:02 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:02 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:02 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000fed000/0x12000)=nil, 0x12000, 0x3, 0x12, r1, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:02 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 18:26:02 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 863.273852][ T1378] fuse: Bad value for 'fd' 18:26:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:02 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 863.300008][ T1379] IPVS: ftp: loaded support on port[0] = 21 18:26:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 863.384032][ T1387] fuse: Bad value for 'fd' 18:26:02 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:02 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 863.498992][ T1404] fuse: Invalid rootmode [ 863.508806][ T1379] IPVS: ftp: loaded support on port[0] = 21 18:26:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 863.638128][ T1437] fuse: Invalid rootmode 18:26:05 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:05 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) 18:26:05 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:05 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 18:26:05 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:05 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 866.304091][ T1455] fuse: Invalid rootmode [ 866.320007][ T1453] IPVS: ftp: loaded support on port[0] = 21 18:26:05 executing program 1: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e20, 0x7ff, 0x4e22, 0x0, 0xa, 0x0, 0x80}, {0xfffffffffffffc00, 0x0, 0x0, 0xffffffff, 0x0, 0x9, 0x0, 0xffffffffffffffff}, {0xfff, 0x0, 0x7}, 0x4, 0x6e6bb1, 0x6b601848a598cc0e, 0x1, 0x1, 0x2}, {{@in=@remote, 0x4d6, 0x6c}, 0x2, @in6=@empty, 0x3507, 0x0, 0x2, 0x2a, 0x4, 0x9, 0x9}}, 0xe8) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r0) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000100)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x3}}, {@cache_none='cache=none'}, {@loose='loose'}], [{@euid_eq={'euid'}}, {@uid_lt={'uid<', r0}}, {@obj_user={'obj_user', 0x3d, '#*cgroup-'}}, {@appraise_type='appraise_type=imasig'}]}}) 18:26:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:05 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 866.486767][ T1480] fuse: Bad value for 'rootmode' 18:26:05 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1, 0x80800}) 18:26:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 866.635127][ T1500] fuse: Bad value for 'rootmode' [ 866.731165][ T1453] IPVS: ftp: loaded support on port[0] = 21 18:26:08 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:08 executing program 1: accept$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) 18:26:08 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:08 executing program 2: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x50, r0, 0xc4f75000) r1 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:08 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 869.378581][ T1540] IPVS: ftp: loaded support on port[0] = 21 [ 869.394735][ T1542] fuse: Bad value for 'rootmode' 18:26:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:08 executing program 1: accept$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r0, &(0x7f0000000380)=""/87, 0x1f7) 18:26:08 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:08 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:08 executing program 1: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$netrom(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000075000/0x4000)=nil], &(0x7f000026bfec), &(0x7f0000002000), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e20, 0x7ff, 0x4e22, 0x0, 0xa, 0xa0, 0x0, 0x0, 0x0, r2}, {0xfffffffffffffc00, 0xd641, 0x0, 0xffffffff, 0x800, 0x9, 0x400, 0xffffffffffffffff}, {0xfff, 0xffffffffffffffff, 0x7}, 0x4, 0x6e6bb1, 0x6b601848a598cc0e, 0x1, 0x1, 0x2}, {{@in=@remote, 0x4d6, 0x6c}, 0x2, @in6=@empty, 0x3507, 0x0, 0x2, 0x0, 0x4, 0x9, 0x9}}, 0xe8) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000100)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x3}}, {@cache_none='cache=none'}, {@loose='loose'}], [{@euid_eq={'euid', 0x3d, r0}}, {@uid_lt={'uid<', r2}}, {@obj_user={'obj_user', 0x3d, '#*cgroup-'}}, {@appraise_type='appraise_type=imasig'}]}}) [ 869.602705][ T1575] fuse: Unknown parameter 'use00000000000000000000' [ 869.651820][ T1540] IPVS: ftp: loaded support on port[0] = 21 18:26:11 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:11 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:11 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:11 executing program 2: unshare(0x40000000) r0 = socket$inet(0x2, 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x250008ae}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r4, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x8080}, 0x800) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:11 executing program 1: 18:26:11 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 872.375493][ T1633] IPVS: ftp: loaded support on port[0] = 21 18:26:11 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:11 executing program 1: 18:26:11 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 872.442176][ T1638] fuse: Unknown parameter 'use00000000000000000000' 18:26:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:11 executing program 1: [ 872.642357][ T1680] fuse: Unknown parameter 'use00000000000000000000' [ 872.817507][ T1633] IPVS: ftp: loaded support on port[0] = 21 18:26:14 executing program 1: 18:26:14 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000000)={0x400, 0x2, 0x7fff}) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RMKNOD(r4, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x1, 0x1, 0x7}}, 0x14) 18:26:14 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:14 executing program 1: [ 875.451356][ T1715] IPVS: ftp: loaded support on port[0] = 21 [ 875.456629][ T1717] fuse: Unknown parameter 'user_i00000000000000000000' 18:26:14 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:14 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:14 executing program 1: 18:26:14 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:14 executing program 1: [ 875.647767][ T1744] fuse: Unknown parameter 'user_i00000000000000000000' 18:26:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:15 executing program 1: [ 875.816905][ T1759] fuse: Unknown parameter 'user_i00000000000000000000' [ 875.927008][ T1715] IPVS: ftp: loaded support on port[0] = 21 18:26:17 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:17 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:17 executing program 1: 18:26:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:17 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:17 executing program 1: 18:26:17 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 878.529959][ T1796] fuse: Unknown parameter 'user_id00000000000000000000' 18:26:17 executing program 1: 18:26:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:17 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:18 executing program 1: [ 878.706475][ T1809] fuse: Unknown parameter 'user_id00000000000000000000' 18:26:18 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r1) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r4, 0x2}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000000c0)={r4, 0xc}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000040)={r4, 0x3}) r5 = socket$inet(0x2b, 0x5, 0x0) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 878.821672][ T1816] IPVS: ftp: loaded support on port[0] = 21 [ 879.033663][ T1816] IPVS: ftp: loaded support on port[0] = 21 18:26:20 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:20 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:20 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 18:26:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 881.568362][ T1869] fuse: Unknown parameter 'user_id00000000000000000000' 18:26:20 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:20 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:20 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:20 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r3, 0x5409, 0x0) dup2(r3, r0) 18:26:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:21 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 881.713045][ T1893] IPVS: ftp: loaded support on port[0] = 21 [ 881.770517][ T1909] fuse: Bad value for 'fd' 18:26:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:21 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 881.909464][ T1926] fuse: Bad value for 'fd' 18:26:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 882.010212][ T1941] fuse: Bad value for 'fd' [ 882.049146][ T1893] IPVS: ftp: loaded support on port[0] = 21 18:26:23 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:23 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 884.606479][ T1973] fuse: Bad value for 'fd' 18:26:23 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:23 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r3, 0x5409, 0x0) dup2(r3, r0) 18:26:23 executing program 2: unshare(0x20000080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:23 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:24 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 884.763610][ T1990] fuse: Bad value for 'fd' 18:26:24 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:24 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 884.845841][ T1997] fuse: Bad value for 'fd' 18:26:26 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:26 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:26 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x42000) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wlc\x00', 0x22}, 0x2c) 18:26:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:26 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r3, 0x5409, 0x0) dup2(r3, r0) [ 887.642705][ T2014] fuse: Unknown parameter '0x0000000000000006' [ 887.660616][ T2016] IPVS: ftp: loaded support on port[0] = 21 18:26:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:27 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 887.759999][ T2025] fuse: Unknown parameter '0x0000000000000006' 18:26:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:27 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:27 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 887.910034][ T2051] fuse: Unknown parameter '0x0000000000000006' 18:26:27 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:27 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 888.054914][ T2061] fuse: Unknown parameter '0x0000000000000006' [ 888.116027][ T2016] IPVS: set_ctl: invalid protocol: 43 172.30.0.3:0 [ 888.158791][ T2016] IPVS: ftp: loaded support on port[0] = 21 18:26:29 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:29 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r3, 0x5409, 0x0) dup2(r3, r0) 18:26:29 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:29 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x29}, 0x2c) [ 890.698353][ T2096] fuse: Unknown parameter '0x0000000000000006' [ 890.709031][ T2095] IPVS: ftp: loaded support on port[0] = 21 18:26:30 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:30 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 890.869647][ T2119] fuse: Unknown parameter '0x0000000000000006' 18:26:30 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:30 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:30 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000000180)) ptrace(0x10, r2) ptrace$poke(0x2, r3, 0x0, 0x0) [ 891.038395][ T2136] fuse: Unknown parameter 'fd0x0000000000000006' [ 891.215461][ T2095] IPVS: ftp: loaded support on port[0] = 21 18:26:33 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:33 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:33 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:26:33 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/146, 0x92) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$alg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000017010000030000000000000000000000180000000000000017010000040000000900000000000000180000000000000017010000040000000300000000000000180000000000000017010000040000000400000000000000300000000000000017010000020000001b00000093bd1273152e22879c5e44d4539abf6cdbfb4f7618f208d0eac42000180000000000000017010000030000200100000000000000"], 0xa8, 0x40}, 0x2040) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) [ 893.755024][ T2185] IPVS: ftp: loaded support on port[0] = 21 18:26:33 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001840)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) [ 893.797472][ T2189] fuse: Unknown parameter 'fd0x0000000000000006' 18:26:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:33 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 893.954683][ T2221] fuse: Unknown parameter 'fd0x0000000000000006' 18:26:33 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:33 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @broadcast=0x18}, @in={0x2, 0x0, @dev}, @sco, 0x5e, 0x0, 0x800000000000000}) 18:26:33 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 894.216665][ T2185] IPVS: ftp: loaded support on port[0] = 21 18:26:36 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:36 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r1) dup3(r5, r0, 0x0) 18:26:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x79, 0x8, &(0x7f0000001640)=[{&(0x7f00000011c0)="7e7daf1a4e5ae3f792e2700114ab2ff2350641377b2438835db389616a59d743feae2fb84f0be814a847e7b1ed064c66cd0f55f82acb31423d94827d798ad63221bb1f0e0702a514afb2408ebc376e599014b5bcac562da9d4c14a12225e359dc7008d86fcb49ac0f369ad012fa6eeb02197ae3314b91e2b5eb3b1b9921277fd57b6715c32c4e253a66304", 0x8b, 0x7}, {&(0x7f0000001280)="3c86f5ab7254e02996a189b55b75d582d6e15db6ba9ccfbaa739aa1e80b4013248e41c44254ceb30dd4678796568a320010cccecdb3598dbb9cbe2d8cef5bc40544f03acfa47af09cf11b3e1a23d831104d847654ec21d9a847df9a068a1f2e094385489a399563d711e56516aefa3973edc7d6571eecb5f8cde8acd6ab1e6fe51ab198a6e764984db13814fa14c8a544d", 0x91, 0x1}, {&(0x7f00000000c0)="d3404f8d70f28d559e0c1473d5cd1946e7f6a08d16e692830c37934fda1913d36238318e34a3f1240aeb24165ae7cd0331f84d25212d115c2e5c9eb76e0d62ccebb3a7651915cdb4dd598e96b4619e68356d436c1a6d", 0x56, 0x9}, {&(0x7f0000001340)="a39a1319333dddc9d529fb46aa2caa217202a0498497031e2c8f64141cf328153c305fff44b88ece9d81ae8bcafe6a291f379abf876e458bf8a4bea682329ecfc42e160886b09561c4710568dbfbefeedc9cd6acdcd51c6e6542cbb8fddc8966d35db04ba5d9667c1eb49abaa5acb13b7c598f394049a4d9cc15cef5747b9a8f66f611644fc855b997c58e43cef79abb332e0abd3cfd437c515f7e73670844147bdcb50b61a097d1df24", 0xaa, 0x7ff}, {&(0x7f0000001400)="818102c800d5fb9e859e5c225db5f8", 0xf, 0x4}, {&(0x7f0000001440)="75f633653973eb5f7ec8517c353f19b320a03e5845080decca3d0545a47c1757345394a980d73bcbc0eb2d560d7fa818c4fc6c2c6576aa5da8861a22748fd2e77dc1c7804a53aae7381d9093bd1410ea9149094dacd1bfd125432e05bb055cae404421c07321d1eafe7a7122a3ed2b969d0e34887e982b1d88e59cee2d5df5ad9053f2ba3c50c92d77dfcf9b992893b87ae3619a9fdd42943fa0810dd8b936c4f67f51aea84ede46fcf352d45b34dc52a18b7b185c664e0a3701c8", 0xbb, 0x4}, {&(0x7f0000001500)="b312b8a1e67a97d357ddc92ebe5cb8c79a0fbbd2cf540ee8d6a014cc393992b4cd7714028cc384abc7bf4343d554f02871d26454931441d68c7a216a6af3b690d7da27ffbcb4f26ac3090300a69c53b3d3b0caab61b6bf0aa6dc4a9ff0", 0x5d, 0x8}, {&(0x7f0000001580)="7e5770a650879546c8a1ac81f84a603273c021942c7ce37d71366d6208819f3b44c4a38f7cbbaf8b75656b89f85bcf246cbdbb9a55c222f2b7010f9b352e6406b98cd5563c7b2bdd326e0b6fa0bf78e12e34b6e92e1987bc03f84a7a68c31e33faca86be53df5b47cb607ce6d21321e6f4644091120d7862fdbcb3c18d8d45c050453588241910f6e5c5280b9c45d6be8b0ea6fc380b632ad25d002c557982858585a5f6883628eac2fc99a5e0e6b088651490", 0xb3, 0xffffffffffffffc4}], 0x0, &(0x7f0000001700)={[{@errors_remount='errors=remount-ro'}, {@resize='resize'}, {@discard='discard'}, {@noquota='noquota'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_measure='dont_measure'}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@audit='audit'}, {@appraise='appraise'}, {@euid_gt={'euid>', r2}}]}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f00000001c0)="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", 0x1000) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000000)) r6 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 18:26:36 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 896.817457][ T2273] IPVS: ftp: loaded support on port[0] = 21 18:26:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 18:26:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r1) dup3(r5, r0, 0x0) 18:26:36 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:36 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) 18:26:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r1) dup3(r5, r0, 0x0) [ 897.346309][ T2273] JFS: discard option not supported on device [ 897.354991][ T2273] jfs: Unrecognized mount option "mask=^MAY_EXEC" or missing value [ 897.425254][ T2273] IPVS: ftp: loaded support on port[0] = 21 [ 897.589053][ T2332] JFS: discard option not supported on device [ 897.603029][ T2332] jfs: Unrecognized mount option "mask=^MAY_EXEC" or missing value 18:26:39 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) 18:26:39 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r1) dup3(r5, r0, 0x0) 18:26:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000080)) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_INPUT2(r4, &(0x7f0000000000)={0xc, {0x5e, "cbe86e6d09dd152673d84099172649859e250d8fdf9e4c8ee48c0e7d22ed1f390d1326092593244fac859755680a6245eabb77ae6725e3c8cdcffd799404da368238e82627735ac63b046bc6525d8c12871e4db4ee93b6282fe6d6e4bfed"}}, 0x64) 18:26:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) 18:26:39 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 899.888937][ T2375] IPVS: ftp: loaded support on port[0] = 21 18:26:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) 18:26:39 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) 18:26:39 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) [ 900.417087][ T2375] IPVS: ftp: loaded support on port[0] = 21 18:26:42 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) 18:26:42 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x804, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000006480), 0x5, 0x2, &(0x7f00000001c0)) setsockopt$inet6_mreq(r1, 0x29, 0x0, 0x0, 0xfffffffffffffc86) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x4, 0x1}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000000) openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/change-rule\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000608000/0x1000)=nil, 0x1000, 0x8, 0x10, r4, 0x5d8b9000) 18:26:42 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) [ 902.884488][ T2468] IPVS: ftp: loaded support on port[0] = 21 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r2, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80) sendmsg$can_bcm(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x48}}, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x77359400}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e5096133d6c734c1"}}, 0x48}}, 0x0) 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:42 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xd4, 0x0, 0xffffffffffffffff, {0x4, 0x0, 0x0, {0x2, 0xcccb, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x7ff, 0x28, 0x3, r2, 0x0, 0x7}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x0, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x0, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:42 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x0, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:45 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="45e9aed12f060000000000000025d86800278dcff47d01000098", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xee01}}}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:26:45 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:45 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x100000c, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r1) 18:26:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r4}}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r8, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0xae, 0x8, "283eb633a7db275b487a727be1f25ec9b7da6e382b0cd756dca9b7a2f63602c907d7fb5f8afd75efef8e373da1e1d28cdf30bac46d8e940ebedbc3f626ad9ba004993dfd0a51b7dc93c010d007195fa112929afa17ed8447c55eea34a5248e5df152fb5c17f4434b79e046c515cfc5429e1109c2e4fad4621493753a7f799d072fdfb76bc39d65f3d997874a81b0608cd67a29cd4016dbfa3c4249fbac0281e1a7ccc4c7b8ec2044c319ec2159cd89fce5380bddbcecec9d216fcb131eb850ae4f51afff01765217b08f34760d738f280c203399baf5f47a7d0b779a882a993227a2b7bf67c028eb431339352606a375e832c87426d2bca3b47b23ef8d93b815", 0x7, 0x20, 0xa, 0x63, 0x1, 0x6f, 0xc1, 0x1}, r8}}, 0x120) 18:26:45 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) 18:26:45 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='\x01@#:,}vboxnet1$(\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000240)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) socketpair(0x2, 0x3, 0x6, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000100)=0x1) [ 993.804993][ T182] tipc: TX() has been purged, node left! [ 993.925663][ T182] tipc: TX() has been purged, node left! [ 994.085593][ T182] tipc: TX() has been purged, node left! [ 994.255583][ T182] tipc: TX() has been purged, node left! [ 994.435492][ T182] tipc: TX() has been purged, node left! [ 994.635630][ T182] tipc: TX() has been purged, node left! [ 994.805477][ T182] tipc: TX() has been purged, node left! [ 994.995424][ T182] tipc: TX() has been purged, node left! [ 995.165437][ T182] tipc: TX() has been purged, node left! [ 995.385399][ T182] tipc: TX() has been purged, node left! [ 995.585439][ T182] tipc: TX() has been purged, node left! [ 995.755379][ T182] tipc: TX() has been purged, node left! [ 995.935295][ T182] tipc: TX() has been purged, node left! [ 996.136518][ T182] tipc: TX() has been purged, node left! [ 996.315256][ T182] tipc: TX() has been purged, node left! [ 996.485330][ T182] tipc: TX() has been purged, node left! [ 996.685180][ T182] tipc: TX() has been purged, node left! [ 996.855350][ T182] tipc: TX() has been purged, node left! [ 997.075208][ T182] tipc: TX() has been purged, node left! [ 997.275135][ T182] tipc: TX() has been purged, node left! [ 997.455098][ T182] tipc: TX() has been purged, node left! [ 997.625133][ T182] tipc: TX() has been purged, node left! [ 997.835005][ T182] tipc: TX() has been purged, node left! [ 998.035013][ T182] tipc: TX() has been purged, node left! [ 998.235004][ T182] tipc: TX() has been purged, node left! [ 998.484982][ T182] tipc: TX() has been purged, node left! [ 998.684932][ T182] tipc: TX() has been purged, node left! [ 998.855168][ T182] tipc: TX() has been purged, node left! [ 999.014793][ T182] tipc: TX() has been purged, node left! [ 999.174911][ T182] tipc: TX() has been purged, node left! [ 999.365013][ T182] tipc: TX() has been purged, node left! [ 999.554792][ T182] tipc: TX() has been purged, node left! [ 999.724751][ T182] tipc: TX() has been purged, node left! [ 999.904824][ T182] tipc: TX() has been purged, node left! [ 1000.074738][ T182] tipc: TX() has been purged, node left! [ 1000.264664][ T182] tipc: TX() has been purged, node left! [ 1000.474750][ T182] tipc: TX() has been purged, node left! [ 1000.674643][ T182] tipc: TX() has been purged, node left! [ 1000.854727][ T182] tipc: TX() has been purged, node left! [ 1001.075418][ T182] tipc: TX() has been purged, node left! [ 1001.276014][ T182] tipc: TX() has been purged, node left! [ 1001.474517][ T182] tipc: TX() has been purged, node left! [ 1001.644507][ T182] tipc: TX() has been purged, node left! [ 1001.821311][ T182] tipc: TX() has been purged, node left! [ 1001.994376][ T182] tipc: TX() has been purged, node left! [ 1002.154443][ T182] tipc: TX() has been purged, node left! [ 1002.334422][ T182] tipc: TX() has been purged, node left! [ 1002.524351][ T182] tipc: TX() has been purged, node left! [ 1002.744297][ T182] tipc: TX() has been purged, node left! [ 1002.904316][ T182] tipc: TX() has been purged, node left! [ 1003.114279][ T182] tipc: TX() has been purged, node left! [ 1003.334280][ T182] tipc: TX() has been purged, node left! [ 1003.495780][ T182] tipc: TX() has been purged, node left! [ 1003.664419][ T182] tipc: TX() has been purged, node left! [ 1003.834967][ T182] tipc: TX() has been purged, node left! [ 1003.994177][ T182] tipc: TX() has been purged, node left! [ 1004.184173][ T182] tipc: TX() has been purged, node left! [ 1004.374593][ T182] tipc: TX() has been purged, node left! [ 1004.574018][ T182] tipc: TX() has been purged, node left! [ 1004.764055][ T182] tipc: TX() has been purged, node left! [ 1004.924011][ T182] tipc: TX() has been purged, node left! [ 1005.083972][ T182] tipc: TX() has been purged, node left! [ 1005.245337][ T182] tipc: TX() has been purged, node left! [ 1005.403939][ T182] tipc: TX() has been purged, node left! [ 1005.585114][ T182] tipc: TX() has been purged, node left! [ 1005.763866][ T182] tipc: TX() has been purged, node left! [ 1005.943857][ T182] tipc: TX() has been purged, node left! [ 1006.113946][ T182] tipc: TX() has been purged, node left! [ 1006.303830][ T182] tipc: TX() has been purged, node left! [ 1006.493835][ T182] tipc: TX() has been purged, node left! [ 1006.683744][ T182] tipc: TX() has been purged, node left! [ 1006.863748][ T182] tipc: TX() has been purged, node left! [ 1007.063797][ T182] tipc: TX() has been purged, node left! [ 1007.233713][ T182] tipc: TX() has been purged, node left! [ 1007.393656][ T182] tipc: TX() has been purged, node left! [ 1007.576175][ T182] tipc: TX() has been purged, node left! [ 1007.753656][ T182] tipc: TX() has been purged, node left! [ 1007.943592][ T182] tipc: TX() has been purged, node left! [ 1008.113566][ T182] tipc: TX() has been purged, node left! [ 1008.313563][ T182] tipc: TX() has been purged, node left! [ 1148.846618][ T1141] INFO: task syz-executor.5:2506 blocked for more than 143 seconds. [ 1148.854674][ T1141] Not tainted 5.7.0-rc4-syzkaller #0 [ 1148.862941][ T1141] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1148.871708][ T1141] syz-executor.5 D26672 2506 7618 0x80004006 [ 1148.878106][ T1141] Call Trace: [ 1148.881441][ T1141] ? __schedule+0x805/0xc90 [ 1148.885922][ T1141] ? schedule+0x188/0x220 [ 1148.891639][ T1141] ? rwsem_down_write_slowpath+0x7d0/0xd60 [ 1148.897550][ T1141] ? down_write+0x125/0x130 [ 1148.902232][ T1141] ? unregister_netdevice_notifier+0x30/0x380 [ 1148.908516][ T1141] ? sock_close+0x94/0x260 [ 1148.913006][ T1141] ? bcm_release+0x77/0x800 [ 1148.917799][ T1141] ? down_write+0xcd/0x130 [ 1148.922221][ T1141] ? sock_close+0xd8/0x260 [ 1148.926692][ T1141] ? sock_mmap+0x90/0x90 [ 1148.930920][ T1141] ? __fput+0x2ed/0x750 [ 1148.935064][ T1141] ? task_work_run+0x147/0x1d0 [ 1148.939961][ T1141] ? do_exit+0x5ef/0x1f80 [ 1148.944292][ T1141] ? do_group_exit+0x15e/0x2c0 [ 1148.949105][ T1141] ? get_signal+0x13cf/0x1d60 [ 1148.953781][ T1141] ? do_signal+0x33/0x610 [ 1148.958182][ T1141] ? __fd_install+0x251/0x490 [ 1148.962887][ T1141] ? prepare_exit_to_usermode+0x280/0x600 [ 1148.968666][ T1141] ? prepare_exit_to_usermode+0x32a/0x600 [ 1148.974372][ T1141] ? syscall_return_slowpath+0xf9/0x420 [ 1148.979972][ T1141] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1148.986298][ T1141] [ 1148.986298][ T1141] Showing all locks held in the system: [ 1148.994052][ T1141] 3 locks held by kworker/u4:4/182: [ 1149.000612][ T1141] #0: ffff8880a9bb4938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6df/0xfd0 [ 1149.010861][ T1141] #1: ffffc900016b7d80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x71e/0xfd0 [ 1149.020733][ T1141] #2: ffffffff895ac230 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xac/0xb80 [ 1149.030073][ T1141] 1 lock held by khungtaskd/1141: [ 1149.035077][ T1141] #0: ffffffff892e8550 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1149.044534][ T1141] 2 locks held by syz-executor.5/2506: [ 1149.050067][ T1141] #0: ffff888086e26750 (&sb->s_type->i_mutex_key#14){+.+.}-{3:3}, at: sock_close+0x94/0x260 [ 1149.060307][ T1141] #1: ffffffff895ac230 (pernet_ops_rwsem){++++}-{3:3}, at: unregister_netdevice_notifier+0x30/0x380 [ 1149.071290][ T1141] [ 1149.073606][ T1141] ============================================= [ 1149.073606][ T1141] [ 1149.082215][ T1141] NMI backtrace for cpu 0 [ 1149.086615][ T1141] CPU: 0 PID: 1141 Comm: khungtaskd Not tainted 5.7.0-rc4-syzkaller #0 [ 1149.094828][ T1141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.104863][ T1141] Call Trace: [ 1149.108138][ T1141] dump_stack+0x1e9/0x30e [ 1149.112448][ T1141] nmi_cpu_backtrace+0x9f/0x180 [ 1149.117367][ T1141] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1149.123423][ T1141] nmi_trigger_cpumask_backtrace+0x16a/0x280 [ 1149.129437][ T1141] watchdog+0xd2a/0xd40 [ 1149.133637][ T1141] kthread+0x353/0x380 [ 1149.137694][ T1141] ? hungtask_pm_notify+0x50/0x50 [ 1149.142697][ T1141] ? kthread_blkcg+0xd0/0xd0 [ 1149.147271][ T1141] ret_from_fork+0x24/0x30 [ 1149.151964][ T1141] Sending NMI from CPU 0 to CPUs 1: [ 1149.157552][ C1] NMI backtrace for cpu 1 [ 1149.157556][ C1] CPU: 1 PID: 18259 Comm: kworker/u4:7 Not tainted 5.7.0-rc4-syzkaller #0 [ 1149.157559][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.157561][ C1] Workqueue: 0x0 (bat_events) [ 1149.157567][ C1] RIP: 0010:pick_next_entity+0x362/0xab0 [ 1149.157573][ C1] Code: 00 10 00 0f 85 b1 02 00 00 49 39 fc 7f 17 43 80 3c 2f 00 48 8b 5c 24 20 74 08 48 89 df e8 c6 3a 5f 00 4c 8b 33 48 8b 44 24 10 <42> 80 3c 28 00 48 8b 5c 24 18 74 08 48 89 df e8 aa 3a 5f 00 4d 85 [ 1149.157575][ C1] RSP: 0018:ffffc90017af7c40 EFLAGS: 00000046 [ 1149.157580][ C1] RAX: 1ffff11015d26eba RBX: 0000000000000000 RCX: 1ffff11015d26eb2 [ 1149.157582][ C1] RDX: ffffc90017af7d68 RSI: 0000000000000000 RDI: ffff8880ae937580 [ 1149.157585][ C1] RBP: ffff8880ae9375c8 R08: dffffc0000000000 R09: fffffbfff12d7765 [ 1149.157588][ C1] R10: fffffbfff12d7765 R11: 0000000000000000 R12: ffff8880ae9375d0 [ 1149.157591][ C1] R13: dffffc0000000000 R14: ffff8880a96f04c0 R15: 1ffff11015d26eb9 [ 1149.157594][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1149.157596][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1149.157599][ C1] CR2: 0000000000000160 CR3: 000000009242d000 CR4: 00000000001406e0 [ 1149.157602][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1149.157605][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1149.157607][ C1] Call Trace: [ 1149.157609][ C1] pick_next_task_fair+0x19b/0xfb0 [ 1149.157611][ C1] __schedule+0x365/0xc90 [ 1149.157613][ C1] schedule+0x188/0x220 [ 1149.157615][ C1] worker_thread+0xf76/0x1450 [ 1149.157617][ C1] kthread+0x353/0x380 [ 1149.157619][ C1] ? rcu_lock_release+0x20/0x20 [ 1149.157621][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1149.157623][ C1] ret_from_fork+0x24/0x30 [ 1149.159553][ T1141] Kernel panic - not syncing: hung_task: blocked tasks [ 1149.341729][ T1141] CPU: 0 PID: 1141 Comm: khungtaskd Not tainted 5.7.0-rc4-syzkaller #0 [ 1149.349935][ T1141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.360048][ T1141] Call Trace: [ 1149.363312][ T1141] dump_stack+0x1e9/0x30e [ 1149.367622][ T1141] panic+0x264/0x7a0 [ 1149.371513][ T1141] ? nmi_trigger_cpumask_backtrace+0x206/0x280 [ 1149.377652][ T1141] watchdog+0xd3d/0xd40 [ 1149.381808][ T1141] kthread+0x353/0x380 [ 1149.385847][ T1141] ? hungtask_pm_notify+0x50/0x50 [ 1149.390841][ T1141] ? kthread_blkcg+0xd0/0xd0 [ 1149.395399][ T1141] ret_from_fork+0x24/0x30 [ 1149.401319][ T1141] Kernel Offset: disabled [ 1149.405636][ T1141] Rebooting in 86400 seconds..