z_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x7f) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r2) 00:17:50 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000180)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) ptrace$cont(0x20, r0, 0x0, 0x0) 00:17:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x2, 0x8, 0x0, 0x4, 0x80000000}) ioctl(r0, 0x5, &(0x7f00000001c0)="405ec07602343596878189e012b8575d938e73108fd4d1b7dcd7cf36ab07884a5568d210c3c9cc1975c61180fa89b0a4cbe333a97b0ddf36148c547f73219065fa8a60b2f33522563560854168125b7cad0ae776ea595f34acf3e79f62c05de3fce80ef4b49b91521ae16679da42b6df7cb3a5333bfae47b64d4c003be632501cf14cd664ae61cf3871f86ad595993c5c41a8596afb4323f84ba71db04efd299cb06cda859") 00:17:50 executing program 4: r0 = dup(0xffffffffffffff9c) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/24, 0x18}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f00000001c0)=""/7, 0x7}, {&(0x7f0000000200)=""/141, 0x8d}], 0x4) readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {r0, 0x80}, {}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tee(r1, r0, 0x7f, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x8, 0x9}, 0x2c) close(r2) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000080)=""/176) 00:17:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x134, r2, 0x505, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffffe0}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xaf}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5e}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffffa}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) write$binfmt_misc(r3, &(0x7f00000002c0)={'syz0', "74aabd9bba51618701a2eae6fc814f4f477bd78249bf360c3e8432861b864f622c83285f872fb450aeddb8556f70f301ab5ba01d7591c43e466b364eda47aeb2831336a9fe02f88134e32c70b13bb0b73478949fceb15431a8b3821b886b236e4d56c4d01a8dd6bf188f0ec251052f40cdada30a8b3015466a74f14cc6230eb5895fd043bd81d05c88d230271202f8fb9d649ba54878d0a7226d52125871cf99784b98f9a11ed053626ab8ecbdf99873c499ddd4f762a85ec6b0c88ba11a88fbc576645ea8e87fe30a9ccbeb7bf9735f77b143d0f0e682faf7216bed10ff677e394c05293c9c97f158decfc4463345008db75cf30ce8ff0c99eef6"}, 0xff) close(r3) 00:17:50 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'syzkaller0\x00', 0x4}) 00:17:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r2) getsockopt(r1, 0x3, 0x9, &(0x7f00000000c0)=""/184, &(0x7f0000000180)=0xb8) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='em0&\x00', 0x5, 0x3) 00:17:50 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x81, 0x10001, 0xfff, 0x100000001, 0x0, 0x0, 0x8, 0xa, 0x4, 0x5, 0x6, 0x0, 0x3, 0x4000000000000000, 0x1, 0x2, 0x1, 0x1000, 0x7, 0xfffffffffffff001, 0x1, 0x80000001, 0x100000000, 0x40, 0x7, 0x5, 0x2, 0x3f, 0x6, 0x2, 0xeb2, 0xa000, 0x10000, 0xfff, 0x41356024, 0x1f, 0x0, 0x6, 0x4, @perf_config_ext={0x2, 0xfffffffffffffffd}, 0x10, 0x5, 0x7, 0x7, 0x5, 0xfff, 0x100000001}, r0, 0x4, r1, 0x2) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x5, 0xfffffffffffffffe, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x3, 0x4, 0x8, 0x200, 0x0, 0xa6, 0x10000, 0x4, 0x1f, 0xfffffffffffffff7, 0x8, 0x1, 0x80, 0x100000000, 0x0, 0x400, 0x3, 0x7, 0x1, 0xfff, 0x2, 0x0, 0xa94f, 0x7f, 0x100, 0x9, 0x9, 0xfffffffffffff801, 0x101, 0x6, 0x68, 0x0, 0x5c4fb9ac, 0x0, 0xeb31, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x4}, 0x4000, 0x9652, 0x2, 0x0, 0x8, 0x4, 0x1}, r3, 0xc, r0, 0x9) fcntl$setlease(r1, 0x400, 0x2) close(r2) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40000, 0x0) 00:17:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x7c69) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x80000000) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:51 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x800000100000000) 00:17:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xc40, 0x0) r2 = geteuid() r3 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) write$P9_RSTATu(r1, &(0x7f00000001c0)={0x94, 0x7d, 0x1, {{0x0, 0xc4, 0x538, 0xfffffffffffffffb, {0x4, 0x4, 0x6}, 0x11050000, 0xffffffff80000000, 0xaf, 0xfffffffffffffffe, 0x12, 'net/ip6_flowlabel\x00', 0x12, 'net/ip6_flowlabel\x00', 0xfffffffffffffffd, 'net/ip6_flowlabel\x00', 0x12, 'net/ip6_flowlabel\x00'}, 0x4, 'self', r2, r3, r4}}, 0x94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r6, &(0x7f00000017c0), 0x1d0, 0x1f000000) setresgid(r3, r5, r3) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000380)={r7, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) 00:17:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:51 executing program 4: r0 = dup(0xffffffffffffff9c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) ppoll(&(0x7f0000000300)=[{r2, 0x8}, {r0, 0x80}, {r1}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r3 = dup3(r2, r1, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fcntl$setstatus(r0, 0x4, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$UI_DEV_DESTROY(r3, 0x5502) r4 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000001c0)={0x20}) close(r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10, 0x80800) ioprio_get$pid(0x2, r5) 00:17:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) readv(r0, &(0x7f0000001100)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/125, 0x7d}], 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r1) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r2) r3 = getpgid(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = accept4(r1, &(0x7f0000000080)=@hci, &(0x7f0000000100)=0x80, 0x80800) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x808000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x800) prlimit64(r3, 0xb, 0x0, &(0x7f0000000040)) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r2 = getpgrp(0x0) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x7, 0x1, 0x4, 0x3d, 0x4, 0x8, 0x200}, 0x0) close(r1) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) 00:17:51 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@l2, &(0x7f0000000180)=0x80, 0x800) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000280)={'nat\x00', 0x0, 0x4, 0x58, [], 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000200)=""/88}, &(0x7f0000000300)=0x78) r1 = perf_event_open(&(0x7f000025c000)={0x800000000000002, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x396df7f7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x2}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x9, 0x4) close(r2) 00:17:51 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x39, &(0x7f0000000240)={0xf5ffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r5) 00:17:51 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x551, 0x1f000000) 00:17:54 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x3ffffffffffffff, 0x0) ptrace(0x10, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) flock(r0, 0xf) socket(0x4, 0x7, 0x813) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000180)={@ipv4={[], [], @rand_addr=0x2}, r1}, 0x14) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000001c0)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) ptrace$cont(0x20, 0x0, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8a000, 0x0) 00:17:54 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x4) close(r1) 00:17:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) setreuid(r1, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@loopback}, &(0x7f00000003c0)=0x8) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000100)) gettid() r4 = getpgrp(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r5, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:17:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000240)) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) recvmsg(r2, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/73, 0x49}], 0x1, &(0x7f00000001c0)=""/2, 0x2, 0x3f}, 0x0) 00:17:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/fscreate\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) preadv(r0, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/68, 0x44}], 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/235, &(0x7f0000000140)=0xeb) 00:17:54 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x1bb) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3f) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000000c0)={0x0, 0x3, 0x5}) ptrace$cont(0x20, r1, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/fscreate\x00', 0x2, 0x0) 00:17:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:54 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000040)="1000ceeeaed58e2222fa1a7a67161abd63ba4797d1bd251c0ddfec9fbc666a23289b768796439f880e24b1676564e5c3fa955aa3abf0bbc00d5861763bf668158317036af4ba410ff315e91a24747ffcef9f33b823350af795f7e6cff538789bb8fb671998d596358bfa8c4cd47f8d622933c3c18390b92e82efb416b79df36931481a8998e0a0c0c03330d27fae0f5a341c3595e36ae6d3ac5e3b34a90ab1868318d2fb1f28cdc11ce5db8d491fbecbd3eb4435e8461802741d", &(0x7f0000000100)="eed62484aa6cc76ae173b1933de86476b88b000712eded3de04e57699c582d755600f372a31e31d2d9495792920206d29a92feb9566f55ff78fe98c1b159db40994fabe2e91f433cec4dcb3994ed29dd55d48d35f38c7940790e98f0c614a7e0c158dd257abdfc7ee295b5615ee9479ded8b3aabf20489c74784a77d1ffe72f7f8f742359121bf10abb8a32a2a7775fb040c84ab01fcccaa7afcb3e4136a23bfe61b413481", 0x3}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r3) 00:17:54 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400200) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x8, 0x81}, {0x8, 0x5}]}, 0x14, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000001200)='/dev/net/tun\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) flistxattr(r1, &(0x7f0000000200)=""/4096, 0x1000) 00:17:54 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r1) times(&(0x7f0000000040)) 00:17:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000080)=""/240) 00:17:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:54 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup3(r1, r0, 0x80000) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r3) 00:17:54 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) r4 = fcntl$getown(r2, 0x9) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000140)=r4) write$selinux_access(r2, &(0x7f00000000c0)={'system_u:object_r:ptmx_t:s0', 0x20, 'system_u:system_r:kernel_t:s0'}, 0x4f) close(r3) 00:17:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xc2) write$P9_RWRITE(r2, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x4}, 0xb) r3 = dup3(r1, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:17:55 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername(r1, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x7) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x6) close(r2) 00:17:57 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x8, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f0000000240)=""/4096, 0x1000) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) 00:17:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)="72d7742f695e025b666c6f776c6162656c04") preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:17:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9, 0x0, r1}, 0x2c) close(r2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xffffffffffff8000, 0x80, 0x2, 0x0, 0x80, 0x12200, 0x1, 0x40000000000000, 0x8, 0x80, 0x0, 0xffff, 0x4, 0x0, 0x0, 0x3, 0x7f, 0x6, 0x93, 0x6, 0xfffffffffffffff9, 0x6, 0x6, 0x8, 0x9, 0x200, 0x4, 0x7fff, 0x7, 0x5, 0x19, 0x7, 0x480, 0x0, 0x1ff, 0x0, 0x2044, 0x7, @perf_bp={&(0x7f0000000080), 0x1}, 0x10210, 0x2, 0x10000, 0x4, 0x100, 0x3, 0x9}, r3, 0xd, r1, 0xa) 00:17:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/hci\x00') r2 = syz_open_pts(r1, 0xffffffffffffffff) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:17:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x3, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000001c0)={0x3, 0xb2be, 0x49, 0xffff, 0x100, 0xffffffffffffffff, 0x1c8, 0x800, 0xffffffffffff004e, 0x7, 0x7fff, 0x1}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x545000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r0, 0x2, 0x2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000200)=""/2) 00:17:57 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x11, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/89) 00:17:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r1) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000040)) 00:17:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x2}, 0x2c) close(r1) 00:17:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3e2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x94a, 0x8, 0x400, 0x7, 0x7f}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r2) 00:17:57 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x11e}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="9dd3cd4d240011020000000000000000000000000800030000f0000032c0d12237f956687e99bd727b4b7191e04f97ec1b870bdf6237e5b46927bbfd15d9d759eed73672bb40efaa89df614b85c5c90405e10047636131bdc097ae95c77f2717fe2145a8b202bb48ccb034cde7d619a7668d011d25f9cccbcd4ef3147da53b23a64c4a83395f4a81de5ca00cb44c93f66954cf23aab04a49d94eb8f1b5d5f4c7b8991932591114998ea4e5116df31495fa3425fcd3bd6b"], 0x1c}}, 0x0) ptrace(0x10, r0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffec9, 0x1, 0x0, {0xab}}, 0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:17:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400c0000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x188, r2, 0x11, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1a9d}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x101}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xb1e0}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf521}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xaf}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffff000000000000}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x2e, 0xb, 0x5, 0xd, 0x8, 0x0, 0x5, 0xd7, 0xffffffffffffffff}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r3) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x2, 0x4) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000400)={0x7, 0x8ee6, 0x4, 0x8000, 0x1, 0x2, 0x7f}) 00:17:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:57 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40, 0x41) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)={0x39d, 0xff, 0x4, 0x0, 0x0, [{r2, 0x0, 0x4}, {r3, 0x0, 0x8}, {r4, 0x0, 0x8}, {r5, 0x0, 0x9}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:17:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) write$input_event(r1, &(0x7f0000000040)={{0x77359400}, 0x0, 0x9, 0x7}, 0x18) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x47, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x1430, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x28018, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000200)=""/102, 0x66, 0x2120, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x28100, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f00000002c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x0, 0x0, &(0x7f0000001ac0)) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000340)={0x0, 0x4, 0x1}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r4, &(0x7f00000002c0), 0x1f3) r5 = dup3(r1, r2, 0x80000) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000000)={0xaf12, 0x6, 0x6, 0x1f, 0x9, 0x4}) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/101}], 0x339, 0x1f000002) 00:17:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0), 0x4) r3 = dup3(r1, r0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0x0, 0x4, {{0x7c, 0xd0, 0x2, r4}}}, 0x28) write(r3, &(0x7f0000000040)='H', 0x1) 00:17:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) uname(&(0x7f0000000200)=""/50) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x105000, 0x6) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0x3b, @multicast1, 0x4e20, 0x1, 'wlc\x00', 0x2e, 0x3, 0x57}, {@loopback, 0x4e20, 0x0, 0x5, 0x1c, 0x7}}, 0x44) mkdirat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x1ff) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x67, @rand_addr=0x4, 0x4e24, 0x0, 'dh\x00', 0x2, 0xfffffffffffff903, 0x11}, {@rand_addr=0x6, 0x4e20, 0x10007, 0x2a, 0x3, 0x8617}}, 0x44) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14) close(r3) 00:17:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x15, 0x7, 0x200, "aed6cd1c5361ba576742815a4a1629ad"}, 0x15, 0x2) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000001c0), 0x0, 0x1f000000) 00:17:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'dummy0\x00', r2}) 00:17:58 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:17:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001140)='/selinux/status\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001180)=0xe, 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) fgetxattr(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="6f73322e656d3000e271035189f4552afc5c7137d91bd0e7aaadb01fb96f107e9f41711abe6ab17dcc220b"], &(0x7f0000000140)=""/212, 0xd4) llistxattr(&(0x7f00000011c0)='./file0\x00', &(0x7f0000002200)=""/4096, 0xffffffffffffff5c) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/11, 0xb) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x900, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x25) 00:17:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:17:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) socketpair(0x1f, 0xe, 0x100000001, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200)="6a320c805b49c0112e56971aa25be40829050afeb88bca449af5b3f6310e30154cc1101cc5da79cf6e0a48905964337dc7a82342e0cab33a10b8ded82273de5ab34f6762eb90e5edabd21a9d280b5bbca76256b22d1b66491142a4dbfcde11017709d595", 0x64, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f0000000280)=""/230, 0xe6) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) 00:18:00 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x640040, 0x48) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x18, &(0x7f0000000100)={0x23}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="80010000", @ANYRES16=r1, @ANYBLOB="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"], 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x80) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000200)="0874c3edaabb0f3c888c09da1883d379c2f0098f357c407f079431a2ba97bd70cb549a865752ba0d3ffef2833820b1ec32e170cb085260bd3de71fc949b70bb9fad9c08504b364bd8ff90403ec66cbb46b7d6d9b407526cedacbb6c20706f601262b35") write(r3, &(0x7f0000000040)='H', 0x1) ioctl$TCSBRK(r0, 0x5409, 0x81) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000100), 0x4) 00:18:00 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180)}, 0x4}], 0x230, 0x0, &(0x7f0000000080)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f00000002c0)='net/icmp\x00') preadv(r4, &(0x7f0000000180), 0x0, 0x4000001f000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getgroups(0x2, &(0x7f0000000280)=[0x0, 0xffffffffffffffff]) lchown(&(0x7f00000001c0)='./file0\x00', r5, r6) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x7}, 0x28, 0x2) 00:18:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000140)=0x6f, 0x4) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000240)=0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:00 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCEXCL(r0, 0x540c) r1 = syz_open_pts(r0, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl(r0, 0x100000001, &(0x7f0000000040)) r2 = dup3(r1, r0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x2) write(r2, 0xffffffffffffffff, 0x0) 00:18:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='net/ip6_flowlabel\x00', 0x0) r1 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x144, 0x800) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180)}, 0x7fffffff}], 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:01 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x3, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x800, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4010000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xe0, 0x41, 0x4, 0x70bd25, 0x25dfdbfb, {0xc}, [@nested={0x1c, 0x90, [@typed={0x8, 0x27, @uid=r2}, @generic="a133c77e85c1c32c34556ebb", @typed={0x4, 0x20}]}, @generic="048b9014c8692300519ed0938d904f32515fdece1e5b218298195c073b2ca24521855d896c613d95eae0340109354673383ab422ad99cbfcde96c7fb5718ecd434611d96440737038e311e9c7405b9c2a5eca6f8711b9f1d309c0c75e88bffd7361f05718699706edf7b2202078a661795ed2aba924b6ec18fddc26776696a96cd7b1d87a7d6c3de122b160845c7d7d5ddde8f57d282d5cbea88a8447139295bd44bc8fdb8133b38", @typed={0x8, 0x2e, @ipv4=@loopback}]}, 0xe0}, 0x1, 0x0, 0x0, 0x800}, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000140)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000004c0)={0xffff, 0x8, 0x6, 0xffffffffffffffff, 0x6, [{0x800, 0x8e9, 0x401, 0x0, 0x0, 0x80}, {0x2, 0x80000001, 0x3, 0x0, 0x0, 0x100}, {0x20, 0x40, 0x8, 0x0, 0x0, 0x100}, {0x7, 0x3ff, 0xac97, 0x0, 0x0, 0x4}, {0x9, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x1282}, {0x10001, 0x8000, 0x7}]}) readv(r0, &(0x7f0000000180), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x42000) syz_open_pts(r0, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x37, "ed89c0f804e933360cfecf62ce28f41efc590a733223c99ea732d1c6a21e201ccfce3b460d8f5dd5312fde5ab17bd8fe82e5eda25df80b"}, &(0x7f0000000480)=0x5b) r4 = dup3(r3, r0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xa242, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000003c0)={'rose0\x00', {0x2, 0x4e22, @loopback}}) 00:18:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) 00:18:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ftruncate(0xffffffffffffffff, 0x8) 00:18:06 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) 00:18:06 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}, {r0}], 0x3, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') ftruncate(r0, 0x65b) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80000001, 0x0, 0x1}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RVERSION(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1300000065ffff000001040000005032303030"], 0x13) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) r3 = syz_open_pts(r0, 0x2) sendmsg$key(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="020c40023800000026bd7000fedbdf2502000100000004d301dcee000000004003001700ff20000002004e22ac1414bb000000000000000005001a00ff010000000000000000000000000001ac1414aa0000000000000000000000000a0004041300180005058b003549de1be41ec078700334470f77e3c47b2c36454fa47668d286c8b48d4c26320653360ae1e99a7ee3691c46a52895d604afd398a772c01d5c242baa38f26ded9e104d2f2d9824776db4cc7651703878f929e9799a59afc5dd8f0e474ec9e7cc97a52b9a88c4c9cead3f74ee59b52395c0d0430d75289a008f604b85c5e59514646800000000000a00180080004500dfebc33ef46e376e8d3786e59821bf3fd0b94c751fed69a3c610e7afca1b9554e7eaaa3f521e417c5faeea1dea778a41aaf3ac312db9e94f294e6af21d7bf8372a19f16cda0000000800120001000300000000004c00000006003c00000300000300000000000000ac1414bb000000000000000000000000ff01000000000000000000000000000102001300050000002dbd700004350000050007007f2000000a004e224000000000000000000000000000000000000001a900000000000000000000000000000000"], 0x1c0}}, 0x40000) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) ioctl$TUNSETOWNER(r1, 0x400454cc, r4) r5 = dup3(r3, r0, 0x0) write(r5, &(0x7f0000000040)='H', 0x1) 00:18:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:06 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) getpgrp(r0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fstat(r0, &(0x7f00000000c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:06 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) r1 = getpid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x4) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, '##^,-securitysecurity@trusted{'}, {0x20, "2976626f786e6574305d76626f786e6574312a6574683070726f632d6c6f256367726f7570cb5b7d"}], 0xa, "a4a7fa5c5ffb95f66ddfd648499c8dc660cf3d427fbd11c82760ae536bac1c624142125df07928b9ce52530ae44c93bbf383be9c5548925decbeea4ad4bc9feb1ea99279ca11dd42e992b5e40521e6a2c2828541b2001da76f3ff5505f90ad2df091fcfcc9396f481789b94dba71fd9b7820d7899d4fbf12bbab77906a2db0e6cef8d6540c4364940e71f760deb977b3e3ef5629ac5626e8db61b6db0504c88dfead8bd4382e087f52e29b79d40284797adc62c2fe5b46e33ba9f28f03d4f3821b22867ed7a41b6a10b74a267b90ab51775ea01dba5ec803195ee995"}, 0x12f) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f00000000c0)={{}, {r3, r4+10000000}}, &(0x7f0000000100)) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x7) 00:18:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='io\x00') perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) 00:18:06 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) getpgrp(r0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:07 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df77c002c00fe800000000000000000000088000000fe8000000000000000000000000000aa2c00000004019078000087ae00da8345"], &(0x7f0000000000)) 00:18:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x42000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f0000000100)}, 0x10) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) socketpair(0x14, 0x6, 0x8000, &(0x7f0000000080)) 00:18:07 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() prctl$setname(0xf, &(0x7f0000000080)='/dev/ppp\x00') rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x101, 0x0) ptrace(0x10, r1) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000000c0)=r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r2, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r1, r2, 0x0, 0x7, &(0x7f0000000140)='cgroup\x00', r3}, 0x30) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x4747, 0x2) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x2) 00:18:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=""/44) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') fgetxattr(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/231, 0xe7) fstat(r1, &(0x7f00000000c0)) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:07 executing program 3: r0 = socket(0xa, 0x3, 0x4) sendto$unix(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000300)=@abs, 0x6e) 00:18:07 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f00000009c0)=0x1c) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a00)) r1 = getpid() ioprio_set$pid(0x0, r1, 0x80000001) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x774, 0x12, 0x0, 0x70bd2b, 0x25dfdbfc, {0x3}, [@nested={0x238, 0x24, [@typed={0x3c, 0x81, @binary="798d67b278fda70a148d88d80f056adfb6574f18ae2409f104b65887a80a181144c3447d7969e5e0e258743ea991aecd05db9fa25a3c"}, @generic="079593a756afdff1a501b0f6ba2eebcf101e4b43ddba17c98fc3762217bea5eb16", @generic="9e92c43abb2c5cfda93ace6c2aba313a22ee26f326b7624f4fd59243a603756a46282d389793043aaf3097a31137d52e4da5950b30f265829e411a6fc1a0030df945b4158c0723258fdfc340326a87bef7d0f58ffe0fa4c8bf2574f46ff3918b0f21dd2bd50aad5374fb19ee4be6a471a2cdc6e1116f75f2f5c22aa12199b29efafcc67dfa7783713a02d679ec51cc5bad11d9d93b67480cee53a2579c2b762a18a0fb83862a743589f2ff97d2fa33dc9403340ba9f95209cd80747b41b7a9a20c80b2b2705e61d19b6d44ba9d5e999f8d2ab036caac1d4683f5ca1ebe5d8399355fa374e7024f6a464bb2c0c507dc13164f152ea5fcb9", @generic="012adb70efe73bbdf9bf7bb1e662ee23a932a56f91548b3d1ae611e84bbea32d47c0cc77abd353db36cf2c2c245655c192defdffa1339463d96630f43400cc6e2c1c5fb0307ed82320c3861ee52754cceb91d4b8597f4843f8772be81ba17b4bb26fdb095e153e2873bc76d0d2332d136b11dd6846f77dceac35bb8eb9a140c27fac1758a79ff585e2c6ba803f91e51704cf97133ce17cf39114c28da26333d20e81c97a200a610c67e435666240a77849bb8b24908512b40af5b31c9a1b4228d6199e5e607cfcc5d22303", @typed={0x14, 0x78, @ipv6=@remote}]}, @nested={0x4, 0x76, [@generic]}, @nested={0xb4, 0x44, [@generic="49c19f072442f43f47f3631fce09fe7a95bb7e8c299fd1294dc9a3955874b65859e08fb2b37ff4511b74500f945f0a6bdf27608a2c179c6c9d82de2a8f61b4a3840f9f340a213c8220e0126ece86616e06e39a7391a7f7e273547f67e1ebef2eb83d3d3aabf40e38efedb087fc41fde5fab7010b25b0f7110d7eb3a487e5c5db4ab8", @generic="448103641b9974d91f2209c0", @typed={0x14, 0x3b, @ipv6}, @typed={0xc, 0x7c, @u64=0x5}]}, @generic="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", @nested={0xc, 0x8b, [@typed={0x8, 0xe, @pid=r1}]}, @nested={0x2d4, 0x51, [@typed={0x10, 0x2c, @str='/dev/ppp\x00'}, @generic="5c35d12d4b21f5132d6e52259b", @generic="b0d1", @typed={0x10, 0x5e, @str='/dev/ppp\x00'}, @generic="0be96a5bc3dbd1d4f3051acbd82ad3ac59eafa8fc22d55d6105ce70f7496c5ea3ff2d4cae12c825b03600f9f307e9628af47bcc793cbecd93b01f9a8815c84fa7c2be4d5cb330c72985377c096412a9defd0e66615d364ecba812bea3d898cf776582d6b0daaf240ace39e8f89b3961ebcb463689f53d14121ce0b109c3853f0d8ea939bbf95cc2d1ee44b3f82bffdc177ca0f48eeb7898839e5d9b70a1f1ffda4e90e02c3408e741262b83c4ca2164cfb9e7cc73611e5b9ae68db4579791924edef4d143c2e703522a44e0616d513739a2c52", @typed={0xc0, 0x6f, @binary="edfd637936d190fb90cb69dc5be889eb56e8171c8ce3429ef48333d77596ef5b3621d5883726ed1b009c2650183e418068b1dee8f1213376f2091a3522e9f51086de9de10ed1ae7d8eefecb483756870f40ca50e4182904831fba950ef7f2fdf0637c5a3d3e9920ebbdc86c49f8c15d6884ed220279363449599d217df059f37e1c56f114a41ccd95fc762108c49c588d752f77ecec9d728409c411f690917479bb2ad2e90f51812d774f72b64833820b6330fb768bd05f222b993e8"}, @generic="3064bcef7aaa0daddb552d0002ad059467f5e24f57b0d0c1f832cbae884d04615f4f19a8c0436fd8618a78f6617d40f59aab", @generic="302dea580366eed6fe6f774272a3bbbb7fbe3139fa6bf5576b876f3b0276ef", @generic="2566db2827a310a3ad221bccccb3bbe1f6f9245b742de8acceed1bcbf8d47cfd6802875fb68c9e2f70dfc7c05b9c794da0fc905b823add57f02c98b55c9248fc1cf9e3052f3bc896ac2e7e5042763b8ca4855c5e69fb768aeee8e2b6095bac02633af18164b24d00f1e8e171b92ee3036537379ab39df00ad84b90cbc0ffd47796a2e9bcaf7184220eafc7ca26c15ffb4b322ba1abe04fe89f3ff6e26f75c15be1f24ed96e9facc107339de217e4829bc9778b7530547e5b4ed0"]}, @typed={0x4, 0x6a}, @generic="de4e10ba645ac201a416693e12019b7f1c037d105f96411983588306fdb694e67295f243dec6fa1876e7b12e58be6d39ba3db303aa3647ba72df44ad618aa76de0eb84f24ac54999793de064f0b2b9fa1dba4893e9cdc7b0a88c36b9a662c5f2db0a180d11aa6e9e242baebca27342e37af412bd5d15ced0bcbcd37a0e2913dd2afb2f9364d9f7acc44ce2"]}, 0x774}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) dup2(r2, r0) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x5) 00:18:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/60, 0x3c}], 0x1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 00:18:07 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000180)=0x6e) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0_to_bridge\x00', 0x10) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='J', 0x1) 00:18:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 00:18:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 00:18:07 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000680), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000180), 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='fdinfo/4\x00') close(r0) 00:18:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x800, 0x80, 0x8, 0x9, 0x0, 0x2, 0x0, 0xc, 0x0, 0x2f61, 0x4, 0x6, 0x3ff, 0xd97d, 0x7, 0x8, 0x5, 0x81, 0x9, 0xfffffffffffff001, 0xb22, 0x8, 0x0, 0x80000000, 0x100000001, 0x6, 0x38, 0xe7be, 0xfffffffffffffffc, 0x1000, 0xffffffff, 0x1, 0x4, 0x852, 0x5, 0xfffffffffffffe00, 0x0, 0x7fffffff, 0x6, @perf_config_ext={0x2, 0x800}, 0x10, 0x4, 0x7fffffff, 0x0, 0x2, 0x9, 0xff}, r3, 0xc, r2, 0x1) 00:18:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:08 executing program 3: socketpair$unix(0x1, 0x80000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{&(0x7f0000001e40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x80, &(0x7f0000004100), 0x0, &(0x7f0000001ec0)=[{0x18, 0x1, 0x1, "c3"}], 0x18}}], 0x1, 0x0) 00:18:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)=r0) 00:18:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x1, 0x0, 0x11, &(0x7f0000000380)="744f870e45c621e8c46c493c4fc932ed07"}) 00:18:10 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) 00:18:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x33) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000340), 0x24, 0x0) 00:18:10 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x420002, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x3) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) syz_open_pts(r0, 0x4600) 00:18:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) getresgid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) getgroups(0x1, &(0x7f00000009c0)=[0x0]) getgroups(0x2, &(0x7f0000000a00)=[0x0, 0x0]) fstat(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000ac0)={{}, {0x1, 0x1}, [{0x2, 0x5, r3}, {0x2, 0x7, r4}, {0x2, 0x6, r5}, {0x2, 0x2, r6}, {0x2, 0x1, r7}, {0x2, 0x6, r8}], {0x4, 0x4}, [{0x8, 0x5, r9}, {0x8, 0x6, r10}, {0x8, 0x1, r11}, {0x8, 0x4, r12}, {0x8, 0x4, r13}, {0x8, 0x1, r14}, {0x8, 0x2, r15}, {0x8, 0x0, r16}], {0x10, 0x4}, {0x20, 0x2}}, 0x94, 0x3) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffc}]}) r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x100, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) getpeername$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) 00:18:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffc}]}) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 00:18:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000000c0)) 00:18:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffc}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000180)="c40c771119a438793ffe29f3dbbe391cb0b22a26be2983622f250f290327e9a15b60e877ee5e753e1150e551028e7ab5069d3dfc", 0x34}], 0x1, 0x4000004) 00:18:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair(0x8, 0x800, 0x9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000100)) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:13 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x7, 0x4) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='/dev/ppp\x00') ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000240)=""/203) 00:18:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2046, 0xe) 00:18:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000001c0)="ce33d9012f0b745809f425697561ba77802ec0b97450cbb7cc988027058819cb6e7f47c1d2071423654ddb9f9ba0fff9ddbce355b808080f7f34a7d46ab3c312efa5ad80db71544ca172508f031be5f73408ac8a26416e9a63914509385b4526ae9a8ef3db5fe26a87906116c0be4cbfb165a7af0e4add71c951cfa207d9df9fe72a6824d3c077b556d92eeac79ca8a1b5d6133665495dd17a437fd1cb3c49cfd668a05a37b29683b12b81396446f49d4d1a5d16d13fe5b2cf45f936") r1 = accept4$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000280)=0x10, 0x80000) fremovexattr(r1, &(0x7f00000002c0)=@random={'osx.', 'net/ip6_flowlabel\x00'}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 00:18:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000001180)=0x5) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0x3, 0x812, 0x7, 0x6, 0x4, 0x4}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100)='/dev/zero\x00', 0x200, 0x0) bind$inet6(r1, &(0x7f0000001140)={0xa, 0x4e21, 0xffffffff, @empty, 0xfffffffffffff08a}, 0x1c) r2 = syz_open_pts(r0, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setxattr(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)=@random={'osx.', 'ppp1@mime_typetrustedvmnet0GPL%-\x00'}, &(0x7f0000001240)='\x00', 0x1, 0x1) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000100)=""/4096) r4 = dup3(r2, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) 00:18:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:13 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) getpeername$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000080)={'vcan0\x00', {0x2, 0x4e24, @multicast2}}) r3 = dup3(r1, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:13 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='fdinfo/4\x00') eventfd2(0x5c, 0x80000) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)) 00:18:13 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000000c0)) fstat(r0, &(0x7f0000000140)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) fcntl$setpipe(r0, 0x407, 0x5) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0xd, &(0x7f0000000280)='(]$mime_type\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x5, 0x7, 0x100, 0x3f, 0x0, 0x200, 0x2, 0x4, 0x1, 0x5, 0x8001, 0x8, 0x10001, 0x1, 0x7fffffff, 0x8, 0x80000000, 0x8, 0x100000000, 0x1, 0x1, 0x5, 0x6, 0x4, 0xf6, 0x5, 0x453, 0x9, 0x2, 0x7, 0x6, 0xfffffffffffffc43, 0x400, 0x8, 0x4, 0x7f, 0x0, 0x8c, 0x3, @perf_bp={&(0x7f00000001c0), 0x5}, 0x600, 0x0, 0x9, 0x7, 0x1, 0x1, 0x82}, r2, 0xd, r0, 0x1) r3 = syz_open_pts(r1, 0x2) r4 = dup3(r3, r3, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000100)={0xfffffffffffff063, 0x7549f94f, 0x4}) write(r4, &(0x7f0000000040)='H', 0x1) 00:18:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000003c0)) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000200)) r2 = gettid() getpeername(r1, &(0x7f0000000100)=@nl=@unspec, &(0x7f00000001c0)=0x80) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='map_files\x00') preadv(r1, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/68, 0x44}], 0x0, 0x1f000000) ppoll(&(0x7f0000000240)=[{r3, 0x444}, {r1, 0x10}, {r0, 0x80}, {r0, 0x8}], 0x38b, &(0x7f0000000340), &(0x7f0000000380)={0x2}, 0x8) 00:18:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x4000000000003c8, 0x0, &(0x7f0000000080)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) write$P9_RREADDIR(r1, &(0x7f0000000440)={0xe4, 0x29, 0x2, {0xffff, [{{0x0, 0x0, 0x1}, 0x3, 0xa7, 0x7, './file0'}, {{0x0, 0x1, 0x3}, 0x7, 0x0, 0x7, './file0'}, {{0xd, 0x2, 0x3}, 0x5, 0x9448, 0x7, './file0'}, {{0x2, 0x5, 0x5}, 0x4, 0x8000, 0x7, './file0'}, {{0x20, 0x4}, 0x0, 0x6, 0x7, './file0'}, {{0x82, 0x2, 0x3}, 0x10001, 0x1000, 0x7, './file0'}, {{0x40, 0x4, 0x2}, 0xe521, 0x3, 0x7, './file0'}]}}, 0xe4) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=0xc1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x1f000000) r4 = getpgid(0xffffffffffffffff) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="a6000000290200770500000404000000010000000000000003000000000000006a07002e2f66696c65302100000000080000000000000003000000000000000107002e2f66696c65306803000000030000000000000000080000000000000007002e2f66696c6530400100000003000000000000000100f87f000000000407002e2f66696c65300002000000010000000000000006000000000000000307002e2f66696c6530"], 0xa6) fcntl$setownex(r2, 0xf, &(0x7f0000000140)={0x3, r4}) 00:18:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000240)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() chroot(&(0x7f0000000080)='./file0\x00') sched_setscheduler(r2, 0x5, &(0x7f0000000200)) umount2(&(0x7f0000000200)='./file0\x00', 0x20000000000004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x4) setsockopt$inet6_int(r3, 0x29, 0x42, &(0x7f00000001c0)=0x3, 0x4) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x100800, &(0x7f0000000140)='ramfs\x00') ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000001c0)="a103f0a9a864cd1d660d66477a8ee7b4e9abba5fdb5d136219caf9c4c20284b992ac3bef5330c79efbb7a194b96e54b30e82263b28fa971e626451e390c8d0529799784e441efc87ba28572bba748ea21178e0f99295f8406187533661ca2992a2dbeeaff133b7ac305a2e832b17e1bf2e229b0333190894f6ea82ecf2a81e72410f5a4afe4625178f4757f9e8c240d59d2d7a6a67b58107ab89a4b22bab6f56d55d490b9778eea926d6804a27bbafadd08a2440521a2f8498ac18a281a1978c730c060416d5fc7345ed2ecda7a3a9da3d8d7e41352a0c46e00b722713be064b444fa218e8d15fe22920aef076e29c077c26") r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x9) 00:18:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) recvmmsg(r0, &(0x7f0000000700)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)=""/35, 0x23}, {&(0x7f00000001c0)=""/220, 0xdc}, {&(0x7f00000002c0)=""/187, 0xbb}, {&(0x7f0000000380)=""/59, 0x3b}, {&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000440)=""/52, 0x34}, {&(0x7f0000000480)=""/59, 0x3b}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/6, 0x6}, {&(0x7f0000000540)=""/147, 0x93}], 0xa, &(0x7f00000006c0)=""/19, 0x13, 0x5}, 0x1000}], 0x1, 0x0, 0x0) 00:18:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10}, 0x10) 00:18:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:14 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r2, 0xf00, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0xd7bae45faf7fd10f}, 0x84) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 00:18:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) ptrace$peekuser(0x3, r0, 0x1f) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x4219, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:16 executing program 5: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) recvmmsg(r0, &(0x7f0000003140), 0x43f, 0x0, &(0x7f0000000080)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101100, 0x0) r1 = syz_open_pts(r0, 0x103001) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:16 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000003540)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002380)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001280)=0x800, 0x20) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x1800}]}, 0x10) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000080), 0x17e}, 0x0) 00:18:16 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') sysinfo(&(0x7f00000000c0)=""/84) preadv(r0, &(0x7f00000017c0), 0x1ec, 0x0) 00:18:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0xfffffffffffffffc) 00:18:16 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000aa, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x31f) 00:18:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0xfffffffffffffffe, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 00:18:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f00000002c0)='./file0\x00', 0xf) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:17 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) lseek(r1, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307af41a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x1, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x28400, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1e, &(0x7f0000000180)="3d539f014fa66cea599ef4767b3bdde12e5e57a00f3e3a0b507f5bc2a5bc7f2f5f312d9c43a2acbbaa5204ee7bbe4e1dc4f5f30eaf0fc5bc56aa11c675668f0cf0ee1b07e849986b3363f8b298f5698330f4df831da17f46f3f3179a41b7baaff838b5548044454ba8a7836183c4fdaea759ac10d122df40456f9b26557c078f56d4cef79d024416b790862034ec56948adbfacfcee5e06a49498a6d5898930061fcdc89dba5cd7cba", 0xa9) 00:18:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x2, r2}], {0x4, 0x7}, [{0x8, 0x1, r3}], {0x10, 0x1}, {0x20, 0x2}}, 0x3c, 0x2) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x2) r5 = dup3(r4, r0, 0x0) write(r5, &(0x7f0000000040)='H', 0x1) 00:18:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x558, 0x0, 0x258, 0x0, 0x470, 0x470, 0x470, 0x4, &(0x7f00000000c0), {[{{@arp={@local, @empty, 0xffffffff, 0x0, @empty, {[0x0, 0x28e528936a51fdfc, 0xff, 0x0, 0xff]}, @mac=@dev={[], 0x14}, {[0x0, 0xff, 0xff, 0xff, 0x0, 0xff]}, 0x3, 0x8, 0x9b22, 0x8, 0x3, 0x4, 'veth0\x00', 'veth1_to_team\x00', {0xff}, {}, 0x0, 0x80}, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x56, 0x4}}}, {{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x14}, 0xff0000ff, 0xff000000, @empty, {[0xff, 0x0, 0x0, 0xff, 0xff]}, @mac=@link_local, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x2, 0xa75, 0x80, 0x8, 0x4, 0x1, 'veth1\x00', 'ip6gretap0\x00', {}, {}, 0x0, 0x10}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @empty, @rand_addr, 0x4, 0x1}}}, {{@uncond, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0xbd, 'system_u:object_r:semanage_trans_lock_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000080)='[\x00', 0xffffffffffffffff}, 0x30) sched_getscheduler(r1) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x2c8, [0x0, 0x20000240, 0x20000510, 0x20000540], 0x0, &(0x7f0000000000), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb61c942b277bd5dd, 0x6, 0x9b14, 'team_slave_0\x00', 'vcan0\x00', 'team0\x00', 'ip6gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @remote, [0x0, 0xff, 0xff, 0xff, 0xff], 0x118, 0x148, 0x198, [@realm={'realm\x00', 0x10, {{0x2, 0xffff}}}, @rateest={'rateest\x00', 0x48, {{'irlan0\x00', 'syzkaller0\x00', 0x21, 0x2, 0xd718, 0x9, 0x0, 0x1, 0x5, 0xffffffffffffffe1}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz1\x00', 0x9}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x13, 0x0, 0x0, 'team_slave_0\x00', 'erspan0\x00', 'irlan0\x00', 'veth1\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}]}, 0x340) 00:18:17 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat(r1, &(0x7f0000000080)='./bus\x00', 0x14) setsockopt$inet6_int(r1, 0x29, 0x38, &(0x7f0000000100)=0x2, 0x4) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000000140)=""/196, 0xc4}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000013c0), &(0x7f0000001400)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x10001) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000001340)={0x0, 0x0, 0x7f, 0xffff}) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000001300)=ANY=[@ANYBLOB="7f800001ffffff1e020000000500413c3760dc02e000001ce9960388c5afcb00ffffffff"], 0x1) memfd_create(&(0x7f0000001380)='eth1[/(keyring}vmnet1+$j%eth0:$\x00', 0x3) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000001440), 0x8000fffffffe) 00:18:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x100, 0x2) write$P9_RREAD(r0, &(0x7f0000000280)={0x84, 0x75, 0x2, {0x79, "ba6b66b5cf463c5ec7374ee540195a18b146e311f0c530cbd2c1671331f9f8ef11782f14ee3d2c643834e1bcaa84ef3417a3a526acaf7dd9c5a51f5a83e2403cc6b5e78315bd4644c805e467f4c949c505450a16cf134f527118f1867590d4cbe67e6a9ffc6f6b3c8b7fa3855b1ce6d9ad72497483f8ff571d"}}, 0x84) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f0000000100)={0x2, {{0xa, 0x4e24, 0x9, @mcast1, 0x5}}, {{0xa, 0x4e24, 0x400, @loopback, 0x1000}}}, 0x108) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x9, @remote, 0x1}, {0xa, 0x4e23, 0x5, @loopback, 0x3ff}, 0x4, [0x20, 0x0, 0x4, 0x6, 0x3, 0xfffffffffffffffb, 0x6, 0xd0f]}, 0x5c) 00:18:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000100)=[{{0x0, 0x2710}, 0x17, 0xfffffffffffffffd, 0x7}, {{r2, r3/1000+30000}, 0x11, 0x4, 0x5}], 0x30) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x2) r5 = dup3(r4, r0, 0x0) write(r5, &(0x7f0000000040)='H', 0x1) 00:18:20 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0x7, 0x1, 0x2, 0x4, 0x1, 0x3}) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl(r1, 0xf4f, &(0x7f0000000100)="09ff2653879bdd0a4617c985cb55d7c0eb5afbe18c5857e164ef42c11eaa7d1426b02502e718e84d453a587994f66e8a19a6e94d77eaf24e562e5febb4ccf85a0875845640ac071faead734e1a3c9c0c6862") preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000140), 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\b\x00\b\x00', @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0x20040000}, 0x40) 00:18:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:20 executing program 0: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x11) 00:18:20 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/11, 0x238) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:18:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000180)="a9c12ddd456d40c39cf17a3a1433b9d4ad30004bf14feabc9cd0e8a2311db326f9c561fbd051698858302cce9df0eed7c774aab660f5ca8ba9c67bdf7568bda393c5eab24b0a444daeebf9d876654c0a537f356507d218b1ecb6f2d95acaf7830bd3d37fa4fba6a68a14c2c4b03e0a6dcb41cf1156a827b8f4150580feab2c2e0c5cb8bcf4076e10e5e0a9bd8d6948b0b0f36cefd8caa28388256d8d4fc47dd03c344dae4f65dc459a97034927c6f94e5b91a003655d0e4d851e4e3778798ef6dd26e0ba1db4f4ea8274f23baeaeda316f15511e80d58061326f91786b76066ee9df", 0xe2) 00:18:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/bnep\x00') write$P9_RREADDIR(r1, &(0x7f00000000c0)={0x49, 0x29, 0x2, {0x1, [{{0x80, 0x4, 0x6}, 0x3, 0x0, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x8, 0x8, 0x7, './file0'}]}}, 0x49) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x84004000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x8c, r1, 0x204, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:23 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1a, &(0x7f00000000c0)={0x18, 0x5701da7, 0x5e7c, 0x805e}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="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") 00:18:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(0xffffffffffffffff, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:23 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1ab, 0x1f000000) 00:18:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:23 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:23 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:23 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:23 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='net/mcfilter6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 00:18:23 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/147}], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x9, 0xffff, 0x8, 0xfffffffffffffffa, 0x1, 0x8001}) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:26 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bind$unix(r0, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) setfsuid(r1) r2 = syz_open_pts(r0, 0x2) syz_open_pts(r0, 0x4000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000240)=@get={0x1, &(0x7f0000000200)=""/14, 0x60d}) r4 = dup3(r2, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) 00:18:26 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) accept$unix(r0, &(0x7f00000002c0), &(0x7f0000000340)=0x12f) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000100)}}], 0x1, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:26 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='uservmnet0-$-\x00', 0x0) write$P9_RSETATTR(r0, &(0x7f0000000100)={0x7, 0x1b, 0x2}, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) setpriority(0x3, r0, 0x3) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x49fe, 0x6502}, {0xcb80, 0x5}, {0x80, 0xf75e}, {0x5, 0x7f}, {0x5805, 0x8001}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x81, 0x0) r1 = syz_open_pts(r0, 0x8000000000000003) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) r3 = dup3(r1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000180)={0x10000014}) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e20}}) write(r3, &(0x7f00000001c0)='H', 0x1) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000200)=@req) 00:18:26 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x2, &(0x7f00000000c0)={0x1, 0x800, 0x7, 0x1ff}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x43, 0x0) poll(&(0x7f0000000080)=[{r1, 0x8000}, {r1, 0x1100}], 0x2, 0x3) ptrace(0x4216, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x404000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='eth0\x00', r0}, 0x10) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:26 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:26 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x2) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f00000007c0)={0x77359400}, &(0x7f0000000800), 0xffffffffffffff47) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='io.stat\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000680)=""/175) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/31, 0x1f}, {&(0x7f0000000480)=""/85, 0x55}], 0x2, &(0x7f00000005c0)=""/61, 0x3d}, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000000c0)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x65, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000300)) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r3, 0x1) ptrace(0xffffffffffffffff, r0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='H', 0x1) 00:18:27 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:27 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000080)={0x59}) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$sock_ifreq(r0, 0x8949, &(0x7f00000000c0)={'vlan0\x00', @ifru_hwaddr=@remote}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x70, 0x5, 0x1ff, 0x2, 0x2, 0x0, 0xfffffffffffffffd, 0x4, 0x8, 0x7db, 0x3, 0x8, 0x1, 0x6, 0x40, 0x6, 0x4, 0xe0000000, 0x2, 0x6, 0x9, 0x46, 0x0, 0x7922, 0x9, 0xd1a7, 0x4, 0xfffffffffffffff8, 0x0, 0x8, 0x9, 0x1000000000000000, 0xb10, 0x0, 0x7, 0x5, 0x4, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000001c0), 0x3}, 0x0, 0x3, 0x8000, 0x5, 0x3, 0x3, 0x80000001}, r1, 0x2, 0xffffffffffffffff, 0x4) 00:18:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x101101) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0xffff, 0x3, 0x1000, 0x2, 0x5, 0xde1, 0x45f, 0x1, 0x16800000, 0x7, 0x9, 0x5}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:27 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:27 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:27 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8001) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000000c0)={0x0, 0x7f, 0x1}) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:27 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:27 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) getpgid(r0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000180)={{0x3, 0x3, 0x3, 0x1, 0xfffffffffffffffb}, 0x7, 0x4}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 00:18:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x100000000000004a) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/252, 0x2c7}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x2, &(0x7f00000024c0), 0x0, 0x7}}, {{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/144, 0x90}], 0x2, &(0x7f00000023c0)=""/113, 0x71, 0x9}, 0x200}], 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x1efffffd) 00:18:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040), 0x0) 00:18:28 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="2eebd6dccd492e68ebc8a473e46407c630d4db6de0653ce3193d51c22df30e4d5c976ab856a5373207c3bdc45066475f3bbf8bb705cf57239694460be3e8e378a936426a71e21af273cda27fd57492aa9c56ed") ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000240)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() chroot(&(0x7f0000000080)='./file0\x00') sched_setscheduler(r2, 0x5, &(0x7f0000000200)) umount2(&(0x7f0000000200)='./file0\x00', 0x20000000000004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x4) setsockopt$inet6_int(r3, 0x29, 0x42, &(0x7f00000001c0)=0x3, 0x4) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x100800, &(0x7f0000000140)='ramfs\x00') ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000001c0)="a103f0a9a864cd1d660d66477a8ee7b4e9abba5fdb5d136219caf9c4c20284b992ac3bef5330c79efbb7a194b96e54b30e82263b28fa971e626451e390c8d0529799784e441efc87ba28572bba748ea21178e0f99295f8406187533661ca2992a2dbeeaff133b7ac305a2e832b17e1bf2e229b0333190894f6ea82ecf2a81e72410f5a4afe4625178f4757f9e8c240d59d2d7a6a67b58107ab89a4b22bab6f56d55d490b9778eea926d6804a27bbafadd08a2440521a2f8498ac18a281a1978c730c060416d5fc7345ed2ecda7a3a9da3d8d7e41352a0c46e00b722713be064b444fa218e8d15fe22920aef076e29c077c26") r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x9) 00:18:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000240)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() chroot(&(0x7f0000000080)='./file0\x00') sched_setscheduler(r2, 0x5, &(0x7f0000000200)) umount2(&(0x7f0000000200)='./file0\x00', 0x20000000000004) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x4) setsockopt$inet6_int(r3, 0x29, 0x42, &(0x7f00000001c0)=0x3, 0x4) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x100800, &(0x7f0000000140)='ramfs\x00') ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000001c0)="a103f0a9a864cd1d660d66477a8ee7b4e9abba5fdb5d136219caf9c4c20284b992ac3bef5330c79efbb7a194b96e54b30e82263b28fa971e626451e390c8d0529799784e441efc87ba28572bba748ea21178e0f99295f8406187533661ca2992a2dbeeaff133b7ac305a2e832b17e1bf2e229b0333190894f6ea82ecf2a81e72410f5a4afe4625178f4757f9e8c240d59d2d7a6a67b58107ab89a4b22bab6f56d55d490b9778eea926d6804a27bbafadd08a2440521a2f8498ac18a281a1978c730c060416d5fc7345ed2ecda7a3a9da3d8d7e41352a0c46e00b722713be064b444fa218e8d15fe22920aef076e29c077c26") r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x9) 00:18:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:28 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) gettid() ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='fdinfo/4\x00') eventfd2(0x5c, 0x80000) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)) 00:18:28 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:29 executing program 5: syslog(0xa, &(0x7f0000000240)=""/189, 0xbd) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="020c0105120000002cbd7000fddbdf2105001a00ff020000000000000000000000000001ac1414bb0000000000000000000000000d0004100a000900180200009d868f82e13ff281d54f06706465768cb5a36d0b3bb377daffbe26551428147f5a7f88648f75bda1ee5c1ba8b8d9a534b68d5167020da6920f6bf0ed6b74cec7328eff0000000000f417e122e32f1c18"], 0x21a}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x200, 0x3, 0x3, 0x0, 0x100000001, 0x800, 0x1, 0x5, 0x2, 0x523, 0x7, 0x0, 0x4, 0x100000001, 0x3, 0x278, 0x558b88b1, 0x1000, 0x4, 0xcc20, 0x1f, 0x6, 0x7, 0x1, 0x1f774943, 0x1, 0x3, 0x6, 0x1, 0x3, 0x5, 0x0, 0x7, 0x80000000000, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x2000, 0x9, 0x7, 0x7, 0x3ff, 0x0, 0x7}, r3, 0x7, r1, 0x2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000, 0x0) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:29 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:29 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 00:18:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:31 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000240)=""/4096) 00:18:31 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 00:18:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/154, 0xff4d}], 0x1a, 0x0, 0x0, 0x4000000}, 0xfffffffffffffffd}], 0x1, 0x10000, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x12000, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000000c0)={0x77359400}, 0x10) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1d0, 0x1f000000) write$FUSE_GETXATTR(r3, &(0x7f0000000140)={0x18, 0x0, 0x6, {0x7}}, 0x18) sendto(r0, &(0x7f00000001c0)="f9a9eb011daecf5c8380192cd235d127f39df348a94e88f94542e7ee9b87d368eb64cfc079fd1659fe795af7d0ed1a7409bdc242d61ddc86e62de26e86cac9cd18a6d814b174421b0cf067edeead05fb70d45231a8fc1b871d0548e79a677fe60d6f5baaae4d8b1af8dc2890ef87cb59f988966b179a4f0c4d49", 0x7a, 0x4, 0x0, 0x0) r5 = fcntl$getown(r1, 0x9) waitid(0x2, r5, 0x0, 0x21000001, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000580)={@remote, r6}, 0x14) 00:18:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:31 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 00:18:31 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:31 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000280), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x113) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:getty_exec_t:s0\x00', 0x22, 0x3) tkill(r0, 0x36) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) delete_module(&(0x7f0000000080)='/dev/ppp\x00', 0x200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000240)=r0) 00:18:31 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:31 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) fcntl$getown(r1, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) 00:18:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:31 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:31 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:31 executing program 2: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000180)) getpeername$netlink(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) sched_getparam(r0, &(0x7f0000000080)) 00:18:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000002c0)="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") times(&(0x7f00000000c0)) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000900000000000000020000000400000002000000000000000300000000000000040000000000000005000000000000000000000000fffffffffffffffe000000001200000000000000000000f0307b15499a00000000666f000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000"]) 00:18:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:32 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:32 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) dup3(r1, r0, 0x0) 00:18:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x420200, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = open(&(0x7f0000004c00)='./file0\x00', 0x2, 0x1a0) epoll_wait(r0, &(0x7f0000004c40)=[{}, {}], 0x2, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffff800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) recvmmsg(r1, &(0x7f00000049c0)=[{{&(0x7f00000000c0)=@rc, 0x80, &(0x7f0000001740)=[{&(0x7f00000001c0)=""/193, 0xc1}, {&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f0000000440)=""/108, 0x6c}, {&(0x7f00000004c0)=""/215, 0xd7}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/129, 0x81}, {&(0x7f0000001680)=""/89, 0x59}, {&(0x7f0000001700)=""/1, 0x1}], 0xa, &(0x7f0000001800)=""/46, 0x2e, 0x7}, 0x8001}, {{&(0x7f0000001840)=@nfc, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000018c0)=""/169, 0xa9}, {&(0x7f0000001980)=""/196, 0xc4}, {&(0x7f0000001a80)=""/135, 0x87}, {&(0x7f0000001b40)=""/76, 0x4c}], 0x4, 0x0, 0x0, 0x80}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001c00)=""/35, 0x23}], 0x1, &(0x7f0000001c80)}, 0xffff}, {{&(0x7f0000001cc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d40)=""/195, 0xc3}], 0x1, &(0x7f0000001e80)=""/210, 0xd2, 0x900000000000000}, 0x40}, {{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001f80)=""/149, 0x95}, {&(0x7f0000002040)=""/118, 0x76}, {&(0x7f00000020c0)=""/130, 0x82}, {&(0x7f0000002180)=""/32, 0x20}, {&(0x7f00000021c0)=""/15, 0xf}, {&(0x7f0000002200)=""/216, 0xd8}, {&(0x7f0000002300)=""/31, 0x1f}, {&(0x7f0000002340)=""/189, 0xbd}, {&(0x7f0000002400)=""/239, 0xef}, {&(0x7f0000002500)=""/125, 0x7d}], 0xa, &(0x7f0000002640)=""/146, 0x92, 0x9}, 0x2}, {{&(0x7f0000002700), 0x80, &(0x7f0000002b40)=[{&(0x7f0000002780)=""/169, 0xa9}, {&(0x7f0000002840)=""/75, 0x4b}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f00000028c0)=""/92, 0x5c}, {&(0x7f0000002940)=""/248, 0xf8}, {&(0x7f0000002a40)=""/193, 0xc1}], 0x6, &(0x7f0000002bc0)=""/189, 0xbd, 0x8b5}, 0xb0}, {{&(0x7f0000002c80)=@ax25, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002d00)=""/119, 0x77}, {&(0x7f0000002d80)=""/114, 0x72}, {&(0x7f0000002e00)=""/32, 0x20}, {&(0x7f0000002e40)=""/2, 0x2}], 0x4, &(0x7f0000002ec0)=""/129, 0x81, 0xffff}, 0x2}, {{&(0x7f0000002f80)=@un=@abs, 0x80, &(0x7f0000003100)=[{&(0x7f0000003000)=""/81, 0x51}, {&(0x7f0000003080)=""/28, 0x1c}, {&(0x7f00000030c0)=""/30, 0x1e}, {&(0x7f0000004180)=""/109, 0x6d}], 0x4, 0x0, 0x0, 0xbe}, 0xf7}, {{&(0x7f0000004200)=@can, 0x80, &(0x7f0000004880)=[{&(0x7f0000004280)=""/107, 0x6b}, {&(0x7f0000004300)=""/136, 0x88}, {&(0x7f00000043c0)=""/204, 0xcc}, {&(0x7f00000044c0)}, {&(0x7f0000004500)=""/190, 0xbe}, {&(0x7f00000045c0)=""/158, 0x9e}, {&(0x7f0000004680)=""/209, 0xd1}, {&(0x7f0000004780)=""/235, 0xeb}], 0x8, &(0x7f0000004900)=""/172, 0xac, 0x5}, 0x80000001}], 0x9, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000001c80), &(0x7f00000044c0)=0x30) 00:18:32 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x2) write(0xffffffffffffffff, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:32 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:32 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:32 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:33 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 2: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x2, 0x51) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) r2 = inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x1) inotify_rm_watch(r1, r2) ioctl$KDADDIO(r1, 0x4b34, 0xffffffffffffca51) 00:18:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) write(0xffffffffffffffff, &(0x7f0000000040)='H', 0x1) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(0xffffffffffffffff, r0, 0x0) write(r1, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 2: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x4) ptrace(0x4208, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:35 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:36 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x14, &(0x7f0000000000)={0x6, 0x8, 0x6, 0x8000}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) getgroups(0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f00000004c0)={0x210, 0x0, 0x6, [{{0x6, 0x1, 0x80000000, 0x20, 0x8000, 0x0, {0x4, 0x2c00000000000000, 0xe9, 0x3ff, 0xa806, 0x9, 0x7, 0x3f, 0x0, 0x9, 0x100000000, r2, r3, 0x1, 0x7}}, {0x2, 0x3, 0x18, 0x1de, ',bdevsystem\'systemmd5sum'}}, {{0x6, 0x0, 0x1, 0x80000001, 0x10000, 0x2, {0x1, 0x10001, 0xfffffffffffff5a0, 0xe3, 0x7, 0x36e, 0xfd5, 0x3ff, 0x46b, 0x8, 0x4, r4, r5, 0xfffffffffffffffc, 0x10000}}, {0x3, 0x9, 0x9, 0x6, '/dev/ppp\x00'}}, {{0x2, 0x3, 0x20, 0x40, 0x84, 0x2, {0x6, 0x9, 0x9, 0xb9e1, 0x60d, 0xffffffff, 0x100, 0x1, 0xd6, 0x2, 0x3a56, r6, r7, 0x1, 0x3f}}, {0x6, 0x80, 0x9, 0x10d, '/dev/ppp\x00'}}]}, 0x210) 00:18:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() iopl(0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) fgetxattr(r1, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240)=""/4096, 0x1000) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:36 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000280)=r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000180)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xffee) setreuid(r3, r4) 00:18:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='lp\x00', 0x234) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:36 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:37 executing program 4: readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x2) r1 = dup3(r0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:39 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = memfd_create(&(0x7f0000000180)='/\x00', 0x2) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000001c0)) r1 = getpid() r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x10001, 0x0) write$input_event(r2, &(0x7f00000000c0)={{}, 0x1f, 0x6, 0x9}, 0x18) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:39 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, 0x0) prlimit64(r0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r1 = dup3(0xffffffffffffffff, r0, 0x0) write(r1, &(0x7f0000000040)='H', 0x1) 00:18:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:39 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0xf, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:39 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x4218, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:39 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x5, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:39 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x800000ff, &(0x7f00000004c0)=""/132) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000080)={0x0, 0xfffffffffffffffd}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000380)="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") ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:39 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x0, 0xff}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) memfd_create(&(0x7f0000000080)=']*cgroup(vboxnet0\x00', 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:40 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='N', 0x1ff) link(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='./file0\x00') clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x1) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f0000000280)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x27, r2, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 00:18:40 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:40 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 1: readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000300)=[{r0, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r1 = dup3(r0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000040)='H', 0x1) 00:18:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:40 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) ustat(0x1, &(0x7f0000000180)) 00:18:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:40 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:40 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ptrace(0xf, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000240)={0x8, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e24, @remote}}}, 0x108) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:41 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:41 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:41 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0xdde518b614e15af9, 0x0) write$selinux_load(r1, &(0x7f0000000240)={0xf97cff8c, 0x8, 'SE Linux', "e617ba0372f3ed6b1808cab2eff10ad22bee1550b50c4b109ebf27a6db65b3252c19e982c9bf2a8c74d8cd09eff5be06bdf7221ee5525bab73148c87bf39d379f88eca9eb32557c2ba4262f6169bdfa8e456a829c5d83431fc4d52ff16340e7bb1a0b53d94ea0fe6bb2058bc269ad7be63624d3bd226845ba421159ab787c8cce5373c34189b50dee13101017ad987fb79b24404e798f9195b5eebbaf5c3c26407ad06a1b2758bfd2c53325af41e3f95fbc23a19478ad36e04df852bbb8ceb6d35"}, 0xd1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:41 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:41 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x80000000015, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x9107, 0x0) 00:18:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:41 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x2) r1 = dup3(0xffffffffffffffff, r0, 0x0) write(r1, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:41 executing program 2: clone(0x8000000, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240), 0x4) ptrace(0x10, r0) r2 = getuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000180)) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={r0, r2, r3}, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x400000000000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r1, 0xf, 0x1}, 0x10) 00:18:41 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:18:41 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x200f1526, r0}, &(0x7f0000000180)={0x4, 0x200, 0x6, 0x3c38, 0xfffffffffffffffc, 0xb35}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getpid() ptrace(0xb041a1948b0a0a9, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:42 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 00:18:42 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00') r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x4, &(0x7f0000000240)) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000180)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x2, 0x0, 0xfff, 0x0, 0x3, 0x404, 0x2, 0x3f, 0x8, 0x2, 0x0, 0x10001, 0x3, 0xaf1, 0x1, 0x8, 0x0, 0x1, 0xfffffffffffffff7, 0x2, 0x3ab6, 0x6, 0x7, 0x5, 0x626e80000, 0xe85, 0x9, 0x0, 0x5, 0x0, 0x6, 0x3c4, 0x8, 0x3, 0xfffffffffffffff7, 0x0, 0x100000000, 0x6, @perf_config_ext={0x10001, 0xe1df}, 0x20820, 0xfffffffffffffffb, 0x2, 0x1, 0x2746, 0x8, 0x6}, r0, 0x2, r1, 0x8) 00:18:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:42 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 00:18:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='H', 0xfffffd3a) 00:18:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TIOCSBRK(r1, 0x5427) poll(&(0x7f0000000080)=[{r1, 0x201}, {r1, 0x400}, {r1, 0x4000}], 0x3, 0x40) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TIOCSBRK(r1, 0x5427) poll(&(0x7f0000000080)=[{r1, 0x201}, {r1, 0x400}, {r1, 0x4000}], 0x3, 0x40) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x3a6f72a}}], 0x40000000000005d, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'veth1_to_team\x00', 0x1}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x8000, &(0x7f0000001880)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10000}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) write$binfmt_aout(r1, &(0x7f00000016c0)={{0xcc, 0x9c, 0xffffffffd2ab4715, 0x1e6, 0x23e, 0xfffffffffffffff9, 0x4a, 0x1f}, "49523b01586ce81c9fad34ada157a189bc9c3b0d56e54e76dbce4dd88c3d166770956df18ecf84191019454cd4d6e57e2f53d1fb9e882e3ff95f145045fdab7e259db551370736b3714f8a4bfb4b216990b2fb81a4acec908c4d35584c19f2441af30c5755ee2f1fff6ef22971b936f8533a04c6e175c5482fc96a2aa7c6513afc597efff3e8a2abcf49f240fa3ea4d4", [[]]}, 0x1b0) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:18:43 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) tgkill(r0, r0, 0x26) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 00:18:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$TIOCSBRK(r1, 0x5427) poll(&(0x7f0000000080)=[{r1, 0x201}, {r1, 0x400}, {r1, 0x4000}], 0x3, 0x40) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040), 0x0) 00:18:44 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x420080, 0x2) write$selinux_user(r0, &(0x7f0000000180)={'system_u:object_r:xserver_misc_device_t:s0', 0x20, 'unconfined_u\x00'}, 0x38) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x1, 0x0, 0x3, 0x80000000, 0x0, 0x81, 0x2, 0x0, 0x7}) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000300)=[{r1, 0x8}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:44 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x11) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='4group\t\x00d=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x9, 0x0, 0x7}, 0xffffff79) 00:18:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="643d0000000000000000d64fb60b99e380de027814750943136a46c74791fb2d5acb51534cd098b3", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1fd) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de603bbf0ee0cdbb7874eba03b39f247a1fbf854228ef57f42af82a880014d09cfef41c7633dc0c0b9b5d3c1c6e6d1cc113994bc7df104d8b2e152e861f0a055d8a18822ad9648b4341b5cf6154a65bd7908706fcf395705e9a2feed85f1a83194142a20a8d489e5789f8f7ac6300", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x10000, 0x100000, 0x0, 0x3}}, 0xfffffffffffffdbe) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') 00:18:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:44 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x28}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) prlimit64(r1, 0xd, &(0x7f00000001c0)={0x6, 0x4}, 0x0) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)="996a0d7c18b05cd0267f5ab5ac79ac587515a9b2ed72ec9a9b424212c33ff5d35cb4399298981c16", 0x28, 0x0) keyctl$set_timeout(0xf, r2, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0xfffffcb8) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040), 0x0) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x8000, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e23, @remote}, 0x6, 0x0, 0x100, 0x101, 0xffff, 0x0, 0xe5, 0x6, 0xfffffffffffffd2e}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r1, 0x2) write(r2, &(0x7f0000000040)='H', 0x1) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000080)=""/143) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x15, 0xfffffffffffffffd, 0xf, 0x3, 0x0, 0x70bd26, 0x25dfdbfb, [@sadb_x_nat_t_port={0x1, 0x16, 0x4e23}]}, 0x18}}, 0x4000881) 00:18:45 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000140), 0x0, &(0x7f0000000000), 0xffffffffffffffab) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) r2 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x10004, &(0x7f00000017c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fffffff}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fuse\x00'}}]}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x17, &(0x7f0000000100)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4800) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000003c0)=""/72) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = syz_open_procfs(r0, &(0x7f0000000340)="636f726564756d705f66696c746572002581603a061008d0521490daebad2eb420ed735fa1aed62bd68dd33263f8689da04e0686c0408ed398493a3a848d494552b91f84c79f122af84400e7") setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x1, 0x4) ptrace$getenv(0x4201, r0, 0xffffffffffffffc1, &(0x7f00000001c0)) getpid() write$9p(r2, &(0x7f0000000240)="83206107738df40d01fe0015311d759d8876871c57f37fff64960f0fad134ef6871db5b1fa50d515edc85383109ab959f84a813d6b644b8fd9dc5172e8142b6da20d4aa524532cd82d206fe00424e1be39b9d1d4bca40038097211ffa818eb8a81d5220cab6d30c2da60df9e0d9d4643519f4873e73c82abff92818a46127446d759ea0c5402da49200598b36c17770878f63d2a2d732740781f154e0d69465f114623b1986743d987d51aae1a3be071ef7f3e53b9aea760e0a8586c9529053a02", 0xc1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = request_key(&(0x7f0000000480)='syzkaller\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000500)='trusted.overlay.origin\x00', 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f00000017c0)=""/140, 0x8c) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_GETXATTR(r0, &(0x7f0000000600)={0x18, 0x0, 0x3, {0x8000}}, 0x18) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg(r2, &(0x7f00000003c0)={&(0x7f0000000340)=@l2={0x1f, 0x7, {0x7, 0x5, 0xfffffffffffffffb, 0x20, 0x9, 0x1}, 0x0, 0x2}, 0x80, &(0x7f0000000240)=[{&(0x7f00000016c0)="0f96d905391c3ed31c5ebf105149e109228e90365dbd320ef96d89d8e5ffb9f9f5bb0eb0595d0b4f22574f19b754c323afb68b477e94ae26eee7470c384e5d9e115a8522f167721bb41a3d9a117758f7dd24da15aa14a829263e1fd93c45115b823f2a2d3881545ccbec423b2b4c258e54f98a3341d1de4d6f215608baa43ef6e48d1acf3702906ec13d24faa9f8bab9891458626982b78107b057ea82ce7b5f79f76dc04261d9208095bfd3d985a6a78613aaf14aec5b23ec3beb49409b3eeaecbcdff73e", 0xc5}, {&(0x7f00000030c0)="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", 0x1000}], 0x2, &(0x7f0000007400)=[{0x30, 0x113, 0x9, "bd88d789b3cccb788cf0f2ca5a0d60dcfabadfb849a27777cdf7ae2c"}, {0x50, 0x11, 0x6, "cd4ff5e35069f2b9a8eff2430c7efe7320058b282b8cece20f919b6707a1ef680e3e0e999be9d3eb58b096f4d8afaa2f2634cc7d7a734c5da1"}, {0x1010, 0x0, 0x9d6, "ab17d0f8c2ca4b8057d5effb9486b1a1df18c0d3be844744a3f08cef7ec802ba9920985a0450d0f65f59b28a175c16dec4fae07fa959a1f1501f94d2b11a1aef159f8e25f06e71d45989fc7bccca9e80186e245a06f581f9d7452c39d5e4ee1f2b799cae8b0da154efd2e1741161a598ce9c6b9bd3d9859eed0a4ea61704d68ab5187bce7df7c1f85ff6530e94e9b677c3e80a9b0c6977cc74a62954e4bbf1cce0d736df0b5b8a9299722f39160e4b32e35b22f955a04877379fb4666372570f3302ce0d32b6dce4de6ad1beeb775a416bc10a51c63281c24fae62a06db18a5b06f617d874b2c010216fae018cbbe484a50c008ca2563f72bed8d4c85cec959fe79ce32cc7d8a375d1cde8fb4cb0b6f201bccacb92bd399bb1eebc3e0b7fc4b468ae5e8ad04d7c398497498b3f7f1d9053d6343b0df3cbd255e392d7880e908cae40645e7e6a6ac9d6eb6ed5de5d43b8bf951061f3d0f9077193f79642f3982f6e86af930a6390b4ceaa7fa686b351a73bcb9bbaac0b7b4b1c46f1c7a3a07362687351cd14ef0cba1cf8372a0534e884f061125111ba1062b79ced24b9746d74d6615f06ed08b71f9c3531d87497c64a1aca99681e8d5e4086baa3c350e289f02f92487f46ca0838a6f841d2dba979158e092d62c93a640485607461ef99db20c0679e61f959e1565e935046fb44334e0b2de3d7f5313b9799d53b7a7a19abd64fff1960689d111e2b077a4c3f29e443cc1d70937a1fff827b0a9a37f12f0120e5bb64b9bed6c9b899240ec1ca33aa50a14bbeef2637551e29eca58899d81a06633e2fe5d202cb7a7d8409c7a4068903d90be12ddc2f1252c767e805e4b1b0efcf8f8dd32b3e5151dc608f8b1cf39578472e5a6e1752a834a45a99fe6f896deac7d3259f0b7c01dba4ced00924ba7f385d48f3fb27b5e15cdab0cbe9441f24fe247f8603c0838e6aecb418b9ef57f585e2fbbc65fb6f018f64c96e06bd63b6f2c4b6792575c0e24d13682eb524f67a578d9a2e1b59cb69f643f49e59d6b1332e2d0ad8ab5a8a33c4fbd96f094aa6109f08ca03aacb712555fc87e73402ec111325410dee3380c4d40ac90f5188c64b8f3171f96f01b11548bee06edebe973917459a2ba24a5703deec4dc886af4b706ce1ef0c2aec40981966fcc57b72548fb046b82332a2e648768dd7ed32437d5cc01264cad23b11758952514d65b439a6709fbc38a9057fa4e420af6335b69ba4b2ab995b209065da023f989e9a0ae1a8fe27a5b92bbb948c2cccede5d87d8c19c0c0fc0e3292d74f57be37a65918b5462d78c1a67165927fb8484885aa4787d8e39334e07ad3b98bfffde44a5aad8886640c928ec6c98c23cf39e470f5b90e0bf1bd5f712530f10bfe930530d2569859e2cbde68420b658686ee7b1ea48dbf362490405bea666aedeb60e8fe287eb71ae70068d0f0b28290c28b2d605cccc9372cdebfaa2c7c91c14b8fae8c5f3411b67a227af03f3909eabb40ffb2498737acc82173fdf4ddae5b893e60aeb81f8b6b31d480510683ce96f7adb742c0c0a6a39bde29901864de7ee24cc851684bef54abc02cc4336f4c2fa091cd9e8d8f997d738d0f4fb2c9050220efbae75464b7bb896d105319f75a1d74264d5a69ceb5314949e595e06310b2b51871757fb198937dfef0e1e0355e51ccdcc8ff4a5fa1b820395aee82a078e44620304e6a5bf877a77321080cb9240a67608d6f674e4301ce936700a61972c0c72ad3e2df7e26f8d2c5e2ff7da232ccb0cd630f548cd5d1b62bbfd98ff8edc16036ba6463c4b2bd5aa417431b6ef4d5d99f79a2ed80743dfde2bccecc60b411f58bfa331dc082bbfbe357e41fec5edfd4b3be63b156ae6944145095490ba3002db0df5989fbbb65dad2fa1f577f10735662ae6af85f302a74fbd72a1c78a924927f95ec44add2bac9ddec18c49829b388ab5b1ad92e977f861cb99bc6e48594ee8000ab5c24c9b1c30eb8b19a09cde3ee6db84096a0d5249d78793a3f598f738470ebc9cdbd5e6577026d1838c6ab87408d06a4b9fd0d58a5e1c9c21df2aae8a41e292eb383061257dc7103f402455c05f683650505ffaa2241ce42997194274900fe277a48f74129744d92bc3aa59e8cb40fac606c98e7b9cfd4159254f18a8ae873bd2709d3024a77d1303f2178a50aa9bc64aceb9c95518f859217d4f9f4d2bdead4507606d849907183975983834bd9fbefec2bcb74785b547d1510f85d72dae390ba49af9135227d93a1af9129efa8cf83e64831e0f61a2de485c26cfcd33f60d7e8af79182bdcccc7dd9f096bafbfdff1b80de5fe9889871895555974423638bb4eebe511a1000df8d5d0ce41d5ee334a3393d091d3360bad8e496556224f1b7060220b07f81dca80be0df087203bb3ac8a7361f944a193867c16458dd308de6ef0a851b919d2a6fc326a224a7a71bcb6bd4c0179a0672c23ccf904654bbfded8cabdc188173295e839f38f084e975b68f62f79408b0e092df6cded5ab7fe2a8f5df90015e6a9b1b54af0a6be6652e7be1cc9c2f33ba46654d1b706bec53af826c0a46243097297914b3cdf6154602d51229378d46cb190189c0a1a4aad1ebbdb6e13249d395a5bd21f48dda82bd6e9371c8f1b65bcf4fc0d8c8f70f260a90d324798068b840d5e49527997469c4de14e575cec77fbe8aa992891b1fef7a9f2fcb23ac9e1e2f06ea704f3342e27019aea11fd542926f296570479d0fcf2b447bc45eff9ab63cd55632d9fbcbbb9d0b914d0904c8002cf48e7f867318206b527f85a5d2d2ad630ba571ea6c9cd392e23b89c8727d8d6d26d6ce1b7fe10cb7a1d18db87fdc4875919c62d99dcf3d203007578a0e15e01916dd442c96713783a6128255495f143f82742f4a1542de8bea3e48c6b51a5f6af6bcea7f4d94adc90809a4223db1ad0aca85a5716140cb549a0fd2cc04e8485d8b43103df6429615388a79a1ad5a149b9434d5342a9a7ffbdcb1c4806fbdd6c0e70ed2711d267909e931141f09265dd8d253b2f04357a9c1c0eba1de32e571a099f761e4b6d6a04862132c55d3536076c6b42f2ab15fdd8f299df287daf413d376d83b8fc51a7080a915434c18e894ba385380696a3bfa5c1372e0576cfefc691b1da269a9c90fb19a8a2c34aa8775dcf97258601d3e141e5a7df063f5cc6b35d494fac781a0c0472e972a38199c9d9e3cb423caff8d3feffc551acac18d0fb9306a81092f0ff42ee74609784a7d97ccc112ce23250874f2ce6ec9b864dd993d67fa458392f2836c62d938cde246b789cac9e38c93f53bc99473ee7439c7b81fcd075535b7c60cb93216bbbee4866b71ac1ee2493e8b2c1bcbb7ed7145b60b052e73a1a409d60a52a4c2815481be1871dc3badecdcf39ba775db0da03e3cd0a43e2f6f336c3fab59443ce5e7f2738cab29aebb3fdacc2cb32d844c53d32a1e79885084d0df6c31b94ce07f34d1be99c98098dcc95a57c7df242aee34f264a7d47b112c777880369b3f47fc60b0153fd24db0354bee038dddd68ffffb0c1a3600869bfb73800ca8b34e25a1acf203eb621054d43e1a7410d9e5cfb6ff8abbfbb6f3bcfbc0dacea8846bb0a40a5577c9d50f73347cc4ea9d0fc0245f0e304aaa9c4b30a9414b4563d76244049c9b124094d2d9d4a22076957597fca1bb4b7fa3de5088d5537da0aced9b222c5e40724d49ac3fe0f304f4f64cb08990b9c4c4af725ef03b78ba761ec23e4e1d36c069e59d794dbdc6f6e851f490ed99467ee1291f3ec6bafb717acca3b129fd3b51db47ab29d390d074278445692708ead04ad107fe39eca17270e1553da735f9bde7b5b2be5d84af6b4f680e7b0160eee2b88f70c86319f9ffd361b1103839e76b403d8a283e016fcf22420776d1263f5631c5c9c9bf94fc229e5bfff0f2d5d34e6c910cb4b5c6acd35d8bd24140bd7c9105d7524a5bd4a9488af4c9ff390bcfe81f66341a842655fcc51acc074c1800f951d0e4e2b1dcde45d4ac3789fc68f985b627a40ea3a0c67f6f63ce5562a7fa58f6481529cda16642f0bdc41cb234bb47d90de0928453d4e0bd909932b5eceddb502b7db42d490ff2f923dd92b9f1eb276c9160852d2360713f68dd30f806821469975d87bed140b97a44b4cdd9bb8b8d266ae3e912535ee0bd3461179f9e270319fb04a27f19589680d0b65c14d5ed713bcc8d26d0731b2c9e8cad1d2b187bafb8ece43650019e7565a20cd10c55f29d0b2a5bbc764fe6fd8b7ad78c2dd878243be46ba997616d9f7a8b96345cb928b2e2dcef7874ef7fb84f4189844d56a8fd6ce6195d498696190516c8c2c0758f2b3acf57fb27153f01106a28e4dd7e0e348ff3e15536fbaee623505a13f3bcd82639242e95280dcae1d3b272c789e77503cbb6ae300a2720c32812b1e3f71f9a0e4468587a0e0bcbda63daa383c3b1bf77439001ad9e453ea39931fc59d6b04255a5353ae0f8aa0dfa9008e401e1c83225d1f8dca13e6e7eb5e516db113594a19454fe7a376c5101c75eefecb16f84f6fb3104cb7cce75d0ff9d9adf8343edeea95063974483621e4d8ccd914ffcde9ab220ae1b7d52593d813b60bafb2a51e8e585565631e416f876d75a32fa7a42c4d3c62a59226761c161ca2f2c0189693a536bd71e4f4a67d58523bff4bd4d47996393fadb19552651e0a9a47f20ca370480b32f9476e1f8e1d5711381da33af6837aaab97bb0511050262c18a512eb4d95e621a2c1f56a6bad1382ad72b3a331309ebf2fdde2a1420594dc3b3659d5d25e1a4c87b53f6a6fa7e4efa63f29173b0afd596b2b44eb74446df2dc9ec9f9399deed87aa85c3e431f3ce65494871e7b9a4368a27fccdd6efe296d782e06adb5df85d76078041f4edde19a36c3dc93ffda7dc7a2847d8d293f27512fcaee62accd00911974fd093668e9036cd857021c94ed4ce17c48d936517616a605b41d7f60743813338a0c2da6cea1891b301ac76428cd2ee051334d072cb9c280ca5f5dffb4eaa037b75b6527ea62b46cb9fa06c444e70898d68930e6665ea1c09933ab8c5301111bb9c6042f06d46b19a4935e6cd6da755e478707e57777de48e20264c736206580e0afc1e908d4a5da839a6e91532ddc3c380b446356cce6f23e452e5f5e6db7b62bd99dc7f9ac75800bc465a92c7be25c4da8ccfff9517bd247820aeeb6f3d81d9c98dc864b10812975aadc829c2cedce18172da655418793cf54a1de2d8552f4ffa88c8b395099f0cc7dfef19befba601a762b805f0db97635d634e321034f43643a4bd07cd28a6c050959210700abf25950f46ffc08c90a445b2877e740fbf007e9b9df510556c4213740dd7f0203261a71f78bf73b529d747a330db40f71a4a5614fc3f52b84d8781acf100f00a26c1e146b5e01975ae8ab98e59bcb7e5b51cff86d08b23f72a18d83decd9735b9e6404c9e18e512841dbfc222b6c13c3d93a0b60f745b1aa786ed0f50a029dbb38cf6fdc5dd8cfb94bd70173fa54fc512d0e2b564969e5518bac6b7dc679e0c1e4c0991f8a761409f81247c0c70db26c2507bdcc52310316e1e0d3e0685986f6f896fade802b263b59415c33fc2a33feee23883c4402902b33a3700853f9e5c62359642ad20687487f3c69fdb183e22a5f9cb891e1070054de38e70e0323d8c2e932fd97fb8c3587054653fa647f981a808319d703056509d5029bff66be08ac0c8ce76e7e34cca335d72d716c5b4df7a0746694fd9262eff2f317355b1d45794ee32cfa0771425f5723a25e8cfa22875"}, {0xc8, 0x101, 0x5, "ebc82cd2e8acfba42b0549e31e594526be0de35306aa6943f26df36db96f2db53886274a84f01c8ec7edbd3c2d1d9b71e64a0e048bca126be75c25af3f40674db877dc848c575de85a139bcaf54015b1ed72432f69af27d8130ec0fe7ccd5a441582e8e34a508509d882c13d9bef7a512172053ca6fef050383197f1d6583e392e835492f0807b26ee7ce71a0c0ff5f1806660e4ad55138e0f3309a7cddef493b72b480894207ff3a297891762ecd89565"}, {0x58, 0x115, 0x80000000, "74e650c1205e44c671dde46ca5ca9d23f0327ebf715a022034e6bbffda71c9b1b56e3f947e72eaaee6dfa53505655676b5239af9297da01d499f91fb7c9346efcf4e1a"}, {0x1010, 0x101, 0x80000001, "13e49d028de4e59be9751e675effea635609d183b5eaf9eba90c0ca1306c93db59f595c2f017b0b367b1f5138cb55b1d042d36317f53bb2646992912e69e13a703e8a92de0c71b4e0a67e1a334cc3fdb6422966724b126a61001eb19073738aa2088e425c0e7f71c584275676071132f18598ae74dfd0e23ec6b16ae506e29a35802515edc5313856f25cabca95dcefef0cba21c2007da6be76d60180fc49b242e5671facf68ba9949d10be6d36b1df707959f1a79150e122e7ed897a83d04658363c98844e49e6dc925181b6d2a0a3c7f536715021f7b6a94bbd9819fb68a07d45a680b1e9c825ab334c233a5e6979303e4b7cad2a8356376b9f3f73b22db3f7178574b6c609b1acafa7ca273037f1f9ed4ac6b7874c731661cd2913e74c59e43d01118ec04c31f19a93c3d14851d6833eee4c792918ec5d85d2430397485fe4679cdad86fda71d94b74a14da1271fb53fe8cd4322aab3aa84f8ea0b017204686cd6689d4181fe0153eb623a02e81bd9a3c17ac137d232439f3b45cb26f759ef92bc4714372ad4d6453b8ce262cf3b5fbb5eaab71781e08c685d6b82eed8c37ae17a4b52ae005563842b1759af8a8e675b360497d90a55689c3222c58d9a7c3f5f7e6d74b1006e56b6cb7071bfdd0f4e6ff89b8052cffab7dbe179881cd0eb79192e276480bc64849894f90ace8bf1e28534d0aa2a7b4e5478cc928cb047dbda9adafe4d63272fea7f89ff139fc664f26c13977aab1270df8af67226c112670521d941ec57b95fc18211cad0207267a0d83658f8ad6b2a9ffbfde42a26bfcd28ccee70d4432aed7646a59a0c47f63554c6148bd184a7704490d6b57281a2684e0f00119b818c595b0c6b6eda09b7a765058511b73cd03c8ec21dfe68f340adbb22fff07c3c4308bd62f0740120d8d79cc305c44c4ff99f4e78e669f6c39d3f69da4e3cb738dc72870a7280a856ec8f15a447ec96751871657235bb8add3a2c86f5ad8203174acfd98ff2b839d6b08bf1d7fdf33d55a34f250811b077544a028f6375d660b18b16fd0477bc0f64fccff8333af027d2377aeb6a9a15e55480ced74994e1c735d41fdb652729d93e9fb855249c829f9e444a17d8090482e3d62eab2ef4a7e5c491ef03310cbd54d764ea5c3ba32963d40e52ab7f1a2bc648c0ffad5758e832c0d3166dec1f284283affffb74498bab57a952491586294c39fbfd5cea3adb51eb46542ffc6b0df5ba73ac4598d5c7a8d804a2bb18257f5616539be4761703e2036ed1d71285ff46cad9d3dc997f69198518909e9fa5f40b4970bd3f399dde2416c1c2eab32a240b1dd3526f5297816f51fc86f78ff48d922a5b54ebfc0cd53e186319c550e46fce62f903d058706ec9d5499e6f04c5bddf2130901eae1f122a682a79945094f413368fa9bdee1e3cfdf292178f5a700aaae82877a1627e9d9e3837aaff0671f3c56fd2f82a1d5e3cbac18b3cac0d87fca763bacf17d3920133affc9af0e3487ab45ff3148e93ca74faa5cf49baf4aa94ca35c2edf38a6317aa203892fb306814ea423aa374e2280302be0f278f2a7e9be88a6f7a9ac67286fec28783d1d30499b9129efe597081b576745c15df166e81cf181178ce2edab21f5227c624cce305afc88e04741adf1fa15d3e0ecdc506a01606880290bb1a43ac44729ee74429b24c018ec58353c56f62db971663c168acb5bd8621517f743312ebab478362fece8749d1c05a611dc4121e44f1dbe34f5d630f10b436c048ecab0cee06f15f78c6deb808dd5314726b62140768f27aca8bc7b075f983fc1ac575ca652911f1eb185187674e1bf95f0502a6a9ad2d34b1fcc10f9c59edc79f5143f59164ccaeb5c1d357ffbca715c6df66d6ff11a302a3cfdf0e527288046a3b3685ccbc5e32a0b9f9c6f5bb113e8a8af9e19b13fd85565d797b1111fd19c3ff48d6cdda8cb64447da7842b4af27490215331c9f6bdad7978d8f313a1d5e18777a08536f46ebd3b35933f27db471483e862db4c3453ef8a94e60b83b5bdcf311d07463abeaecfd4933b5f67376ea46b5ab5596cba46d6d75ec47fedbbfce2f275aa93fb702decf6e572959dbba37371d1b278e666fb8e254e4dae5b6467164ffd770f01c0461e296183cd2fd5db6396271b3ad8c96a75384105f754806f0f2a67233e6e22c1caec5999b02d55c2b8d7a1762416cb9068f7d42bcec434a28de8d1d75c07efe0194706fca036ca26e3669369d83f079926c94f303f81e6ab627e137815083723806c7065eb81050a631582dc8ad4c06ce4d4b92223ea71d9fcc28c3318c8a1a6f892bcd4c633b2f4b467eb0c41379e814a2fbbb85475a9831388cb201de1d82b4559be770a3bfdde7d3132d39521e53f180ade91c11f6081788f26eceb0a003bd53e2eb89143d1d73eff5cfefabf2c66978d5c393309149e971357822e9789eb90726888b36485c3183959ba6cf1edd61608e86689227fa94e9566f32fda33342be821d62ef59c11581165d058fbde10b01f89c904f73a867f9e5a6f45294c0c059af859f25089bdc606582094a5aa394b954731fcc6454c05e9055c2b9d4cfa7d506c7248d36b457ece0ab62679c624d5f078f807e4a3cfb4ad1661494855fe2693b5cfbd15b32dd119a053efa430e3cb3ce777c583c0c6b6ba72282f1bf4de1e69ed309705a906ca4dedf7cdea9bedc6c5a2b69a65102ceac8a745238e028add68653ab41ee605f009f63a12381202674249a49e33bb4381309a8e9f5a05104bb7a64eed7333482a282d3f9e2ae355a1acd5dfc9b1146d16328dc9dca28b91aa1535e0657dfb892fb867894c24543664094a5b9c553a664a8fdadff1615faa124c9c278e6569932d37f74240642e22bebfcf2d59e3b26b427619ab0a17a9ade4445be9303b66dff1da53b4dbff7023e3635e7747ad4c6bb03bb0eb1c04d2962f3108ddceb86ab9bdd69c7e439198da1fcb9e1acdac3b82957b4619b8e7c0e44d36744527dcbf0765dcc9513912b2cb376799ac233e85c258393cdfc21266fbd025d698a51a45799e5831973ffaac5cd6f295bcf4cba737ef9c2449ffbdcab535cdc143ed658bf3927d3280852a2728532c98a5bb9aca498404820c43495b926ed7a73525a43d1f59030d246360c7e9e505daca385e4c300ab75b45083fd1dbe75d819b137ca6c9d5023fce017a24d6c166cd89560f010f11fad9846a244f998f238055969933b7987c636f00d6a178b4f0de5d47eee7e2235324e34c419f0360ed7761712abaf06b9e74136b377d413b417e8ff245dafdf2495d814b64eb00954beb11dccc7064a509f61ddd09dbe99f179792ff4e61b94e24cacb5876c6c3c341a1cc106abd9394fa4c9e1596f87004d700783d62623fa6bf4b0e7a861fb7662fc18bfdadfc4bc9b05ad1846c4bb2911857d35fea664a63a4b55c348bf52aad4264de9060112505fa524bc2c6e1a0a6adc6c827913440a1a9df7bc8db294ebb08fc56bb6ec89c62255872b1732d27cf564f6db8e66bf3d9cc2c3c40583fe552d33571cfe265167df7ae2830a42d98a089141b0023a891927d48625d0304013e26a082a73c14f1180834ecbc7c27b7dbd9c71f8852ddb4e7330b02ca05e7ec2f5b3fcbd07a36110a5092c20e309641b036cd41128598d123f86850b6f7c928567022e40ceece09b659d2aaa69f9b4f09e0a688661733bbf480e8e77e3cb4ed353b3f25f768e18ef046660b2f87998482926ffbafc3d6000aada657b5be44ddb560c131b4a341541af973260eeaa9021bc4a708384918ac867a9c76d557037ae399f5268bc9a32320ff22f8eecc6615f54c5d328acbe2a7a14b130a3282aa2fd71bf3eda5e7989a1c6afa198e7ba760b554b51f94403120d59f041a84176ffd4ca6eef487fd5f094c0b636b37edb515d8e88f2a3d761955b2a241ade5fb5a636662cc01808b173b0ec4fecd8c842b582ed6cc5c1c728598f59b147736180e958e830eedc3c57136b8f4586f6391eeccf20a2577291dab41c965969b02df0b7e9f31d1e1bdb94f6ed462c769cadbcd8a8e24f978f30dfde00490de3dcef5392a738a353d219acecc3858efe9be20b568de13998614de4b04e21429b34ccf8afa72faf3e0266ab4419e7ec1128f33007f1e33efb4768fa1339e777bbf8bf9eb3f4d06d684d5a9aebeb57d977980b040a3927b2bf474ed82f248ebcb7b6eb48f295797186e9c485e76a2eeea28a12af3af07d793304f08273e5a6879749fad320d9077e0b2cc908bfad130708986cfca0015a4794ddfed47c3ad016797f72c1763583dc61f8a4f9c1f4f05ed0473c79b00102c2bf492b4cbb8e4ee3fc7a9b6d2e7612a2d87cbe40ee8bd4d0dc6eb633fdeecdef0c7d32eb94b02e43198c8a276419f277cf55a8f342939778ec63f2f78ac08b34cd204664ae1ec1cc4256ccfdd0bb12fa6a1b407ff16e8397c9bb9f6ac15043ba9be90fe4eb5ff435bb9efa50ce4c31dde6a014bf0555575d637e3e2103b30403c0666be3cd73a06cf7709585b57ef4017fca24499578d7121215e2649f51ff48f3d9b0864a33e9e6516b6349e76ded2a0225d557c7338aff6fb02083912bbc692c831724869244845a0e7e607a90fc80848d4905d4138ce8e875e49af4ed1377f18fce53d12746ea646e18a4aad990bca0417821168c2cff955635d410cafb56f51ea6df63e6a631020871ef7721b0419d0dc2a4ee823de07ce425016883c174ac1c7fd05e488c26891de5a618c84dad278c433380557654f68857db74f2a2e51b96b74e5e7cb7a2573c29a92de0ed5b4cc5e1ca159a5eaea51a997270be27d8bc3133aa0f5b1fdb1b2b4c88c3b9913286d83023507aa57b3be4bdd72ffefe9950887ac8db9baeb10d816ef61b06c0221fabfb52d103902709a52d6e3e97be9b80a09a0249de76caef0179850bc7f5531b0d769d49cfb2e8823366b9c7d897758b501a95a5e87616242ca8d03ab0dafa7b832e6b4e7e7e55bd4d3e76526dcff7c7fd875c4fbb8b48d19804a89fd55a8bc55c2aba3f28f0ce726f7222ddd28c4003ef1997459538e4a6809f28698a4c7230c9949e4982c558cb24a7bcefe4aaf3469d90369a8509c53a77c755da6ff1cca175253f7d614f94bef61a85a7730fd28b1660cf6e607bffd46959ce10f8cf14ddc08089335edb97f993b5d9ba30a39ca47812ad48647e5b293077c7f89360f0457a721235d43bec39c15f3a678198adafc9b3d4e38ebdcf07b60c11f11266bdeef98bcd5c63148b250088f9c6a63b9d426610996192cfe27dc692fe29519228a6d1109b60dd7630868e6c3ad55f72813c1ae261fd4e056e777c94350609a67e15a00f1feafd35e984625dbc833ec4ab50d776fbdeeeeb65d642d2e3f5567f3fb1fc371cc526dd9d5eb3fca3fa8f1e4e5575d264fe291f4229e5a95980cafc9e75e946e0cad094a894d714205425f3690557fe2b208e171f573985224dec653f809fa3644a276df24b2f12bc32fde7f34c6fc8f656c44ba3f2d79ab55f482fb023f347775b9b5011460a4d7a990c5fb42374aff46fe98fdda06b832d0b7a7240aa671d012f8644fb4f4e31e05bba080d1cc54ac05ab20ab50a2f776802a53ec029f2fd443a59d3b4575f918104a4078244a647da3a14156bc74ea9b6daa3f1885324202623c041650d174913bc513a5e59ea7b1fe670a8816bc3073ff46691f9697c4e42dca2b941532553b423f4a307069078dabb99be437af36878c34350d4474c2a47ff7f05e50b03b1118ba3e1ffe05c0e80f"}, {0x38, 0x103, 0x5, "94bcc132c34b101918590af7122184077ee807efcc940e6b8c53da74ee12f106efc33b"}, {0x10, 0x10e, 0x9}, {0x1010, 0x107, 0x3f, "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"}, {0x1b0, 0x100, 0x1000, "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"}], 0x33c8, 0x80}, 0x10) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) 00:18:45 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) prlimit64(r0, 0x5, &(0x7f0000000180)={0x23, 0x20}, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040), 0x0) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) r3 = epoll_create1(0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = epoll_create1(0x0) r6 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000d36ff4)={0xfc147812c6696267}) timerfd_settime(r6, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f000001aff4)) epoll_pwait(r5, &(0x7f0000a1efac)=[{}], 0x1, 0x10, &(0x7f0000000040), 0x8) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x64) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f00000000c0)={r7, 0x0, 0x0, 0x369, 0x5}) write(r2, &(0x7f0000000040)='H', 0x1) ioctl$TIOCSTI(r1, 0x5412, 0x400) ftruncate(r0, 0x7) 00:18:45 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000300)=""/240) 00:18:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 5: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000)={0x6}, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() ptrace$setregs(0xf, r0, 0x200, &(0x7f0000001680)="38766344a74a38c215a0f7c9d33351e03b72b948b34cad1593ac137284866f69ca93577aac5bf3c845994d93a40ca5f16f5a856f8c7c38a53b5f416c40fe6e") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xf, r0, 0x80000001, &(0x7f0000000140)="66060cdb8e7c15e59e55e997d7a629b340ae7549c664247ee6f6bc1e4e9f16b57c988b07fa592fb6d93c8266a1050fb32f2f51db28eb5e688d9cceeb21979c4d86229b009360600831bace784c506a6d80ab13fb042e75e942322e3b26e2df0add08869c1a6ea08d415f31e34100afd8089f84d7e07ebc2fb4345d6f04dbc892d8f9b5540b3cee3a3f3f4339a4d3f72c32552710af6a") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000440)=""/4096) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) prlimit64(r0, 0x5, &(0x7f0000000240)={0x4, 0x2}, &(0x7f0000000280)) ptrace$cont(0x20, r0, 0x0, 0x0) getpeername(r1, &(0x7f0000001440)=@ll={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x80) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0}, &(0x7f0000001500)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@loopback, @in=@broadcast, 0x4e20, 0x0, 0x4e24, 0x0, 0xa, 0xa0, 0x80, 0x2f, r2, r3}, {0x7, 0x0, 0xffffffffffffffff, 0xc, 0xfffffffffffffff8, 0x3ff, 0x1000, 0x8a}, {0x3, 0x2c, 0x3ba, 0x7}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x3}, {{@in=@multicast1, 0x4d6, 0xff}, 0xa, @in=@local, 0x3506, 0x1, 0x3, 0x2, 0x80, 0xae, 0xffffffff}}, 0xe8) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001540)='/dev/zero\x00', 0x200, 0x0) write(r4, &(0x7f0000000300)="975947f9541a8d54b42d94ed3bdaf09fa1c25bacf179637147d0107c973a5698f6bdc33471d3604cdfd03da1ea7d5756a1c7aa99e3c4422ead84cf4bf1c3a7f832fac4253a427ccd3b999e757088e0baa43656dbf683dc11e48a212f6d15c1fa5b5458767d70ca41c81ecea44a6645ee1bd938f5832e3d7243de2629e87bcdaccbf48cd860a641c6db8b097cce847b9df117f059a009b32c003d23a5fe05ea088ec4196ab9ffeada48d3bf1086894285cea4060763caac811f4f7d3895d1858acdd153ef0bc0f4527ee6f36c180f8dffdf", 0xd1) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x92400) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000400)={@empty, @local, 0x0}, &(0x7f0000000440)=0xc) accept$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0}, &(0x7f0000000900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000a00)={@local, 0x0}, &(0x7f0000000a40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @multicast1}, &(0x7f0000000b00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000b80)={@rand_addr, @remote, 0x0}, &(0x7f0000000bc0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000cc0)={'vlan0\x00', 0x0}) accept(0xffffffffffffff9c, &(0x7f0000000d00)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000d80)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @loopback, @loopback}, &(0x7f0000000f00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f80)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000010c0)={'yam0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000001200)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000001240)={@loopback, 0x0}, &(0x7f0000001280)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001300)=0x14, 0x80800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001b00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80080800}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001340)={0x75c, r2, 0x403, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x1c0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3ff, 0x4, 0x79d, 0x2}, {0x5, 0xab, 0x4, 0x3}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8001, 0xff, 0x2}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x174, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r10}, {0x240, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x71, 0x0, 0x77, 0x2044}, {0x1, 0xfffffffffffffbff, 0x80000001, 0x1}, {0x7, 0x3ff, 0x800, 0x2}, {0x401, 0xfffffffffffffffc, 0x7, 0xffffffffffff7fff}, {0x100000000, 0x1, 0x7, 0x56}, {0x6, 0x400, 0x1, 0x1f}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7ff, 0x1, 0xe8a, 0xfff}, {0x80000001, 0x626000, 0x7, 0x5}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0xf8, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r18}, {0xb4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff7}}}]}}]}, 0x75c}, 0x1, 0x0, 0x0, 0x40000}, 0x4055) r20 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r20}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r21 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r21, 0x1, 0x1, 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) r22 = dup3(r20, r0, 0x0) write(r22, &(0x7f0000000040)='H', 0x1) 00:18:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:46 executing program 4: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x103000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:46 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(r0, 0x0, &(0x7f0000000380)={0x0, 0x80000}, &(0x7f0000000300)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x3, 0x10000000000000) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x80000) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 00:18:46 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x840, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r3 = syz_open_procfs(r0, &(0x7f0000000240)='fdinfo/3\x00') r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x800, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r7 = socket(0x1d, 0x0, 0x400007f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x1, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff}, 0x0) r11 = dup(0xffffffffffffffff) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x88, r2, 0x310, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2a}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:47 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)=""/150, &(0x7f0000000180)=0x96) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:47 executing program 4: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8011, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x7ff) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000480)={0x50, 0x0, 0x6, {0x7, 0x1b, 0xe1, 0x42004, 0x9, 0x9, 0x2, 0xd0}}, 0x50) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x10000, &(0x7f0000001900)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000130000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,max_read=0x0000000000000003,allow_other,blksize=0x0000000000000800,blksize=0x0000000000000000,defcontext=staff_u,\x00']) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:47 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:47 executing program 4: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300), 0x0, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) accept$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) open(&(0x7f0000000080)='./file0\x00', 0x500, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x80000, 0x0) sendto(r1, &(0x7f0000000180)="f763474b0fb16a36c880dd62cbba21eadf50d6b22d8d0ba92a28eef1f395ca84c579a58ed616804ac45ea3f87382c94bfc185ba95b11d745da8ac5a4abff4f0d362ad2cb332df4a3dff37357f9955d761ccec50ab3d541662818a5302b1ba495f269950f4519", 0x66, 0x800, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1d, &(0x7f0000000480)="76ae642a878220b9a6a6da767ca1df039f883ea2133619fbb195dcd18dfbe9501e63cbb44e1e9eb6b1e6cf661257324738cf266d1e42b65e8eb78b44ff433b3fece5862d61c1a8e2d8f9c6b37efe1f608b0127c56766c86b22", 0x59) read$FUSE(r2, &(0x7f00000030c0), 0xfffffffffffffc55) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000380)={0x197, 0x0, 0x2}, 0x10) 00:18:48 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x1) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x81) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000016c0)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x40000, &(0x7f00000017c0)=ANY=[@ANYBLOB="66643d98bf3100000000c49c740118081f68de14483926113a7c7c0b0196d5fd1159d860c73b8f40e7ba3a7c2527a79173a900008bb895b8cf04d1f67fdd5ec298bd000000000000000000000000000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=01626133274145313726556,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677275e46fb66430", @ANYRESDEC=0x0, @ANYBLOB="34f2ade5291bbe02000000000000d31f8b2cf48e0061137456e59e18e7cc673f1b05593e2f1f4bff75eecf936ed0f52e8c4543"]) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18, 0xffffffffffffffda, 0x8, {0x1f46}}, 0x18) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x754}, 0x28, 0x2) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)) 00:18:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000000140)=""/255, 0xfffffe28}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000080)=0xee0, 0x4) pwrite64(r1, &(0x7f00000003c0)="85d68a6171972a7306b58507c9c5d1951f6d3de4b8147bd7ed2fd9c0e60a6741e24ba21017690f0b81b75e466400617c02a1ea118df7c985bd869f38713730a6d830815fe5984dfdbd716491d0b03a4ddb31dfa391f8213811d1abeabd89e596e186f76c23ca5dcd209755ad56d82c17186f120839b3ed3126c7ad7d38ee901e95fd2cb94ca3ace93d559a843648c71733a4129a9f3328662151633e0dc5a601c275135d39168b59a428e5aeeeb5f87a508b8fc735", 0xb5, 0x3a) dup3(r1, r0, 0x0) write(r0, &(0x7f00000000c0)="00045eec3fcb45967b4faf299e516579ae0495e0c5ecc6374a300f5a9028b7ea11a421b1cbb827321b376255aa3f7724a4e87909a118a8d110f591d818b187c9f713d29394d1da58e8a5356625d353377e63023f016e033779402f1a931f", 0x5e) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)=0x1) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x220201) pwrite64(r3, &(0x7f0000000280)="dfedadd5a14e368385ad3c4b93", 0xd, 0x0) 00:18:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) lseek(r0, 0x1c, 0x3) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f00000002c0)=0x9) recvfrom$inet6(r0, &(0x7f00000007c0)=""/117, 0x75, 0x20, &(0x7f0000000840)={0xa, 0x4e21, 0x2, @mcast2, 0x3a0}, 0x1c) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() write$uinput_user_dev(r0, &(0x7f0000000340)={'syz1\x00', {0x5, 0x45, 0x6, 0x7}, 0x33, [0x7, 0x80000001, 0x0, 0x8, 0x0, 0xf7e, 0x4, 0x81, 0x9, 0x1f, 0x5da, 0x3, 0x4, 0x7eb, 0x0, 0x6, 0x0, 0x3f, 0xffff, 0x1d4, 0x1, 0x9, 0xfffffffffffff801, 0x1, 0x8, 0x80, 0x3, 0xc28b, 0x3f, 0xffffffff, 0x4, 0x401, 0xffffffff, 0xbf1, 0xfffffffffffffff8, 0xff000000, 0x3, 0xbb54, 0xfffffffffffffff8, 0x8001, 0x101, 0x4e, 0xffffffffffffffff, 0xfffffffffffffbff, 0x80000000, 0x0, 0x4, 0x75f, 0xffffffff80000001, 0x100000000, 0x20, 0x8, 0x3, 0xe43, 0x9, 0x9, 0x10000, 0x4, 0x0, 0x99c, 0x1, 0x6, 0x0, 0x8], [0x1, 0x3ff, 0x0, 0x4, 0x7, 0x4, 0x5, 0x63, 0x80000001, 0x7, 0x20, 0x2f5, 0x6f, 0x0, 0x3, 0x6594119e, 0x2, 0x1, 0x800, 0x80, 0x100000001, 0x77c5, 0x9, 0x200, 0x5677, 0xffffffff00000000, 0x25cadedb, 0x1, 0x0, 0x6c6f, 0x571c, 0x8, 0x9, 0x0, 0x8, 0xfffffffffffffff8, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2, 0x401, 0x8, 0x8, 0x3, 0x400, 0x7, 0x3ff, 0x10001, 0x3f, 0x691, 0x40, 0x40, 0x3, 0x100000001, 0x6, 0x1, 0x8, 0x8001, 0x401, 0x9, 0x3ff, 0x400, 0x9b211a4, 0x4], [0x2, 0x0, 0x5d86c2b7, 0x0, 0x2, 0x1000, 0x8000, 0x6087, 0x9, 0x7, 0x2, 0x9, 0x9, 0xfffffffffffffffe, 0x9, 0x0, 0x9, 0x8, 0x7, 0x7ff, 0x4, 0x20, 0x1, 0x3, 0x1, 0x1ff, 0x9, 0x81, 0x7ff, 0x7fff, 0x7, 0xff, 0x7, 0x0, 0x8001, 0x8, 0x2, 0x7fff, 0x1000000000000, 0x2, 0x7f, 0x8, 0x1ff, 0x66, 0x6, 0x8001, 0x1, 0x3e0, 0x5, 0x5, 0x8, 0x1, 0xfff, 0x80, 0x7, 0x100, 0x7, 0x1, 0x4, 0xfff, 0x3, 0x7f, 0x4, 0x8], [0x9, 0x2, 0x0, 0x9, 0x9, 0xfff, 0x8, 0x6, 0x6, 0xc55, 0x7f, 0x1, 0x0, 0x5, 0x800, 0x1, 0x5, 0x7, 0x1ff, 0x6, 0x5, 0x9, 0x5, 0x57c7, 0xffff, 0x7ff, 0x1, 0x6, 0x6, 0x7fff, 0xffff, 0x76c, 0xffffffffffffffff, 0xb7df, 0x80, 0x4, 0x800, 0x2b2, 0x2, 0x8001, 0x3c7, 0x2, 0x80, 0x1, 0x5, 0x3ff, 0x101, 0x49, 0x7c, 0x5, 0x101, 0x2, 0x2, 0x9, 0x7, 0x0, 0x80000001, 0x8, 0x7f, 0x5, 0xc9, 0x2e8, 0xc46c, 0x20]}, 0x45c) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x202) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000240)='syz0\x00') openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x4002, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) socket$nl_netfilter(0x10, 0x3, 0xc) clock_gettime(0x0, &(0x7f0000000080)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000140)={0x5}) prlimit64(0x0, 0x0, &(0x7f0000000300)={0x0, 0x8}, &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x20000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffff9c, 0x10, &(0x7f0000000340)={&(0x7f00000016c0)=""/213, 0xd5, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r1, 0x10, &(0x7f00000003c0)={&(0x7f0000000180)=""/207, 0xcf, r2}}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 5: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)="c728d069ea784cb513aa28e7316a6826c8515c2a72116f7cf73574e708dfec2001fc21469f64eb7be58c4f6e0252ea2ca3d711b0a078c6c088eabc6846d504eb79eaa0aad610f1e49608d5f493eab4772964445aba72a10d69d00357d8d11a79112333bee9a5a2195362aa75c1b80de0538dec2bcf53eb499e55de6222628ec8086f83411edf6a98248d991707cdc22e55db7658feb7497ac525f308bea4390de2709141dfacab8190da75c4e027603cdf47e5e272528dac6bc30ecbdb0afe0ed553c4d3a3e17e5377b484767803d18db5bda07277eed234ccbe1bca61badfebfcc722b650df0fd4c38d28689f5754b86bf5dff21bab81884bd7738339bb7c333a88f2ff767f5e03fed84e324ce2e84e2da602789c413c7fab66adfb457dd05457febc42ef8a9e753d38b9787981bed7c6d868f44d9b20ac3e82594056cd82dd33b355eaec2a89f30ef21a581fc989e4d1181f836d7f0cdd5f0bf33cba6a20053141481a507afd8ee7c1a50b4df171f7e77064a70894e2b78d611e97333e0b8d1df9019cb1591af51be9139ad307ffab9760ac03c62fbdf798b9dffd8179d8578b410b6d303d282e86bbc0b95750e9aebee4e5f1f6ee6c9c55b40226283d14d73730d8b18c7d24dbeb080b217fd78f660530634007a388ce5a23d18506bd2747a3933c18e567fc6cc7debf8c7fb44311244d501b291e99cc155b9559b1b1e214f0a45c4af7b6b031715012d6962af54c8c1d1ffabd70a8e746b972fe870c454bdbcf20851e0ef336d7478a07ac7fa8b9ea93b183c5382ef7bc8fa3133978aa67445285e8e98f39147b5ecca1aaaca52418c0814d0c8aaf3bb776006f135651510ca1820afcba341f8887f325a62391e8578e6cbb2bbff6f4c45ba9aeea3a1272f309b6040cf410c844ddcf20ea1d6bae642fa9a2157819a3e0d8515a6fd8f27896370b8213b71454ff6eae73e835f101bcd09bc5e0d24b92fe8a12988a71cafbd1f2a2cf979807c0ff002ac3de351d6865245ca70478c6c231c96b2e830ea098d588718120713cac5cf43ad953c9eb7d2319eb3acf2fe1c191bbe77e30b9c22581b68e2fc7d59f29a68b20758112eec15bd586ce9d85631cf5801cede09438ca9f50f1c2dc3cc3209ccb2fea01589afa097c429774f143bff4f311ebc28c6ba4810d490262d40cf185e5f8436b8e31165d2344a0946a1784eceee2065c26e0dfad0ac0f7cd6a8ead1305a94d51fca47ff70e1a1f4b3839e086358338a27677e8e714d05c46ca35342c7ed4222fa911d84b5cfd04a02da04f4a9d1e25ee6dfa9e62b91996cd9e6b2896fb317023f9bcc491b5bb78011f94745ff3aa68de093b234305eaec40dd613354a4956089fc69b16b369aab63794f95211d975d01eac23b6166c00e011e6de1ab44633f3583ba37f8828c38b1dd69d5663cf1bb532c2176be2e861c78f85e677c51743ecf1a67810966a8851d3471f5dea9b148b295ea25f23486134bc1614e2401a19cc570fa3dfb0291f866640a1e436d5036a7299f3d8d459428fe705e0a9eb47f90a0059d90f2d1287320fca0214c1a3ea9f44da221bbb96e3c57449b89d5fec5783052726cfdcc057d687552d5668603305a9648804e1894382d3e6e1127103d30b84b2f617c9897959474c2f1c3d0910e9ada11562ad045e693d9411cae163fc8d29391125ee30725217cda229f966a44c7754bc96513bfb732363f1cfc5318518b6ff293b1afc115ab36d2258efd52809a9b6e5cba213aa69f74419372f03e827a6d99276a0b09d6861ac24ebafc9fd31728fb506f04049fefc631684314afdaf1442ede465af466efc38b5df18feaffb099153973ac353f1d25f470f5086c907ed0fd4f494edc8b8b11839218902f25ab6508d0c66d84b16aa21167127d46a40092a6c256797f6457e032f0c68533af49622a1e468100ef48c02647ad6d90c0bce20efef642870bc2ba619109f2eca50d681d12bdee8ee1ba2c95efa096700589f49051fc91b0082a70fd630438fcffbc23f0b16fc59bfa6aa06547d6bb13fc9dccf06e7a6f71d951aa5e2e0b901d9befb3733f1c1edbd590b02aee2848e4bc416cf442d87f320bf06c17c6527f8cbbc70258d9a7810c07e0e06afea36320822aac74b9b9b826dbd340c38c3190162cef740bfbe084a2d675f2435849eb6dc2cdd4ec8d052b7d06bf833a915cee7c8de42c6871e33146344450f6df0187f073fb194b806f0d5799b96dba158d8d656e7a400c5fb60a5cdda9f9f32fd77bcf64a8659d015252a5358fd37777a3043999d0220964f1dd96f75db548ae423bc402cab1e33485ee061e23b9b504f05eb54255a60800337d55d3cd23098692ab8fb21507a618154ee7f445c54ad95df1cd182e28311e9790b9af78887b9c1884c99d0559b3e2829739bbf60bc2b2621565084a3fedac27e8abc81eed33332dd0094dee6220700b229c434ae28590752c783e5289ec435b6cb860495f7e3fd78faf4407f764d4723f17a07ba2d22ece3572ba5d3b029e8aff9fb9b4155c71a37059e9c081866adfe8a9c4535015e3efb4303438189d52a1c5e2b03dff9f36e4753f08fdd6bf1a21a447f16b167685dd54078b0f697606a2aab3f70dfa012d06cb10dfdb1367766bbfe0e3f86c48ae2c764fe68da4b50d0556f294fbc13cbb8b53df2bdeff0050bee54485bbe813393e2c3a749cdfea56e0bb2e2443182aaa0c5def341353f5514e0f08e1e551b52116c1d03a181ed76c8599005297572c5d56a395cdaad5eb889817f5108fab7841214b3313ff3078fa638387817b1c526f1ff3d521ea583ee4eeaef46d837f7e3d26197517b50b75dd5e99045770e0d22627e6320132e3dbe9d40b74e2d047c28378d38e6c67f7a8d39a0d398141e0eaa9eae2320f864ea97c0efbd8f06412436702c00c499c33c0a389bbbd39747d3f3e2bd47071a02c5b76d2d3d0d31d54c5f2b67030070a55b0679c2eac27d2d6151ae9fdd7313783232fbec8858737d18732bd1cf8ff53e70f48fa0d9656d63cc5919999391cbb7931bb38825db118365299a908e1c3574770e481041a88d6b1c815c12f9f368ee7605a633755e791fd2eb73871cc69751fb3ab5babedb2dbd8808c9de52679a0b51f2abf2acf8f250fced062903d65f0b439dd662f0e52c6d75aba7ce64dfec5e364fee969a1ab3b312043ced5352bc8f25871614482c1918c0611e8b5cc8b1e5b238a2c468e4a1cbab92f17f4fe612a6402727a8dbaed6b4be3da07427094c51bd92b6bd3c9308c04924cbe4fea7c4f74fad065b9c4f7de974671370c0dfaacbca4ccc626ff081cfa0eb46aa412c2fa8d70b6e28a341a329b949c8166b538ff6f2a23a6b3ce27c9a504e44f5bb8356d3a22ae2e5d813a9c94432aa21705b981da51ef31a4d1e9a6eb1fb545c9ce713459ccd2811b329ab0b86d370ee910de9a17619289c9f6859f4c37a569c9baafa004ed0204172f62e2922a34834850a77ddd951e6b3c8fe51f2387ac02ecccb41d55c22480b1bfca5062ca5a2341bb1c64f004f8c2aab4ca3ad91198e6b75beaddaf3a44b9178de4c465dc2da0bd09497ebd44a7816a26671346ad1cd2b9f0e4a9f6c8a9232c9826a1481810d3acc2a93616ec9b896f9e4a98e38d05263b5570c43e163caef355454ddf74b23f9471d5d58e58e97f5a2747775dd56d8aad23c305219a0365ca7d6fe8ee20359a9da644a6d57644c1576d0462f51e0c7010d21c2fa842c431e0350f08b44eefc6826b3f8316b730aa074ee54de0fc45eaaf61a2ed427edaabefdd4667e5294a89b53a6f9d8fcf9ea651ee4fef76aa23a83ff01b344a7ffdc035f0c95bb46620a341fbf233c434abca8a9f673469c5e8517c48a48f8d26902b01926521e4b520463b09872d4e11faa7de63d701a2fb746304051363d5d586fddd338b7c02eed3c886eee9d13d0a9e7c0eff1fe2f21c149e6c277e6831699f536e1d014093d34a01f932909ac92087d4f2bbbe3570197aa01112b25d70f353ca98c16522f29e0aec74391b53283cffa64f9e90766e22428775bf3ac72effb92d011cb8d37d6ebd235739421e29abc749f414992aa21d372a98fed1a9a948f0d27c45d95045d0254ee0a4983808d3ae98fa11c2139b010d3eb0ffbab37ee71dea6eff2d7d94513452f8a90d5f910e4400aaf8f940759a94ef9b7835fd0e46b229da6c21eb83122b8a5d77f08a5e6d26b18f5dba6e6098b67c5b76682d557263094cc43cfb779368005635c97fe07d5734fdeb39504099faea15ac3de0f9219215da79138f6eda095d74e39f2bc5685e4ff362d2d7b3a8589c82368eedbe400fb5ac71e1b20d26a05cee14a55bfe50d4dbe2543c25c740d537cead4fe65ceda13993bd0b20ffca3cbc5c2d77a36268b6fd7f62fb3f348b85c2475e16ca8d6df617333463f5529bc30090bf3ef80bd6812454692fff81994176133be339e7d2cff3e11ab6e243b2f1e3ed4234e79644d15f71c7debcdd4bf660a45168d64e4582a1ed405fa1884d41a1b085d4480b67667711b6768a5301dce275bbae2ffa94740f7e1ae0e860ab343195e01f0b7353070a97dfce170990823b5c7aa698cd239e06e69f656ebc4f5e38e79afa7ee5851c6a5832121cf8bc7e1761f9220bfdbb28471243531e7a8b22b024844acdb098c8e3042a6989399282494e9018eaaac2299440bdbe873ed44b9a97756952216a0b995513a54b77f6771ca493a333828f7cd66e477520dae886114055db9ef75795809c6abfae1c732e41c26f914d79e96593310adefe2e07530cb0302f54d52bea051653165512673a30280f277061ab29ef4156a9c2d2cb9b3ba9a4d5ac596fa6c2af9f5026fcbe5202f69f9fa4dbe90e6920d6e9d15be8376b99bfa491124debd1407db6cec4cad4b761ea4d0248c5956893ca89f3f91024341bb7dad8dbc1dd68241744830697d6cd2f6689c8536425844f702f14e72fde63e0f4b2ae6c7bbb9918a8b3006fc98e0f37a24e786602708a6985b0a66e2c0f76c06e58b41a42bcd33f0c83c9b80f7abe295a81591362c1a2502515ed9c651ce0c03e1b7658d074b9f1fb2b1f1ff450a711ffa2bec48573575e910e1cdedff6ce516e1284b0dac379c2a798b6bad5d29bbe7e36d5c08a6d6ff9b0fa2e8926d1a225629a56b6d73959f603e192a786a3d6423e1eee94e4e19676f805247cb2c32844ce6b26c136870c437e7b7003a80369e9f88a329afba83980bac050f1387bae2f6d43020d92e68dcc1c151d5de0aa7fc9b08a32ff09651f06a373096987cb6576a0e259d8c9eae9d1c2c90a8d3b87386ffff0c1aaaab4be83dafa8835f77bc30f644e1f0c24c4964c2e2d0d5fde9083b449ca01f4ee1da9d9774a3b4db06b3f940cea59e0cd798140e01003a74b0e84326f9d52488e513aee20f4e474ed40109e4865f5ac1b6c58821e3c1f7d1fa1795a66d7e89af7d75a585669e86e7e2d38420b7e8744e1efcb8a71ae07d95df658c7747a0f3fd921d5bc15c61242dd86f720094be66d886e7199623933c00b6f1f323d4c4519df6b7916b48a2067f2213a4cab9140589f7e36a91c437c1af3cf68bbe801edb53d0df553b99e56588ab943bfc496828a2f7c44a43f69dcc31f7a3d1ec1babceb72261797ab1b4325b0ec5aaff8045f5ee90e7b721df88570a3b7f3759d11440401b92b3f7a859bd6287730dd45ab4a31516d635ed300f64688f97263af092a081a8ee46c35ff88f597492a4259dbdd4fdfbf5d2690450e062267cd2ae10e331f7535", 0x1000, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000001300)='keyring\x00', &(0x7f0000001340)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x3, r1) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r3 = getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(r2, r3, 0x10, &(0x7f0000000240)={0x23, 0x10001, 0xb775}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x7}) ptrace(0x10, r4) prlimit64(0x0, 0xd, &(0x7f0000000140)={0x0, 0x2}, &(0x7f00000000c0)) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000040)) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f0000000180)={0x0, 0x0, 0xb3, 0x7, 0x7fff, 0x2}) ptrace$cont(0x20, r4, 0x0, 0x0) 00:18:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030570d30303030303030303030e300000000000000302c757369643d000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001dc0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) writev(r1, &(0x7f0000004300)=[{&(0x7f0000001e00)="0182535c69a01613dacc8cdae7b4fec6009a99af95d187de6d0d3be6fc095f07cf15d561459c05ef292dcef123c8e57a504cbbd9f2f80ecad5c5471cdd1d68eceaf5bf9203dfdf37ca380e093182ff6a674e47a58a1d3d2171c5ea", 0x5b}, {&(0x7f0000001e80)="36ac3a61", 0x4}, {&(0x7f0000001ec0)="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", 0x1000}, {&(0x7f0000002ec0)="fa9cf7f076ef9f998ca6bb17c1284bb62a5196e2155129be14083ea030319d39020e2c499ca8263032d966ad029199a47813ea5b9c5726d8b99ae7a1d0f031fbec057ed49787d5f50a3e0c371968165a3efc87a37e4ba6e6ffc5a11255c23a89b88b78f757a1a50617b7adc8c08b1b01bf47786f92431f7bb5aa1716a382d2608549d4e80a6fa31543eadd6ad3", 0x8d}, {&(0x7f0000002f80)="98c98f434a3c51a1c45b4b38dc93980166a3630e9c33c267910b04394900224b84aa8c6b4ded290b5bf7de9480958dd8562ceb415a62b5267f8c94e8c18c2480e57c21c9111fb292ddd94344a2bbbbff936018a7fa1a2ce4f06a1701c99f15d25462111971ec5773b8ad9f2bbb0c292de2e4bf0137c5eb", 0x77}, {&(0x7f0000003000)="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", 0x1000}, {&(0x7f0000004000)="7d0103bf6475ee00f6302a218a77a818fdb0b38d734af9cb68da13821817ccbb1472c1a604d2c3bef3c48877dc5bc75aa7792c7a703b2eab132d4c18d52f34773f1f327b78ef6fcc0a5e23cd0381edf46f5b77a52ee2961c62c68c23c3ca59b9e924de247fff51d5450a2c3b330936337b63662769440d80d79d217e58335732d0d8b227ee1bb06db591be3544105efbe7e451e09f31e16ed90aa83b65acb36047da5044e830eef96b19ec4910776d30c34a58ca9dce4cb46d27ff6c2dbb5462216903d69e063be31767ad5da9586a11456a93aaed89bed26fe9602580302009d450854489e94c39f104a737e7b4", 0xee}, {&(0x7f0000004100)="e21c9845bf9a96dce1043984628a72edd5453e046973469d0e541f55cd14f154cd76e72b8379269d44f06b5973f69355341c7ed774875e831b3f0eb9adc26f9bb56363b0dea1991407ca20ac138f925e5e7cdf3b49c819fb118f018b034af17a2a544e0578b30f9fbf2067684dcc17617b51ac6228796c599b1b54d46a132df70c7cc60b3cf0b61ef81a5b312083", 0x8e}, {&(0x7f00000041c0)="79fa62530e16432ff7daa0515e2b72a4c255958efc04799a810d68ff725bae74261ae1b094a0834ef766b2579d651633a32372c5f18cc359be9b65c00cbe35d8904df8f3f66ad85e728bf14f786a23a4aa32138d89763a311c5a96b47ed9e1c73b86dc89ebf419666514783758b26b753c5ea1b27f60cc2996910492c9642a466aec21741fe356b5cae219127742f36713b3870dd41f81cfe317a7", 0x9b}, {&(0x7f0000004280)="cd41b31ee0d79530a987a0d958efd8778683c930181887a8478957f32ff07754bc7e938713404d3dd8adf792661f568d4dbd102c50d9fe4341078a6733a0f2c7f27eeab9c3f479aa3fcae0abdf1166cac81508c5f75bf3e1466d1d346ca12628a0b8b38098cefbe37aa770f6b7f8", 0x6e}], 0xa) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x50) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x549) iopl(0x8000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x7f, 0x20, 0x4, 0x9, 0x0, 0x4, 0x20, 0x0, 0x3, 0x8, 0x6, 0xff, 0x2, 0x1, 0x9, 0x0, 0x3ff, 0x3, 0xffffffff, 0x1, 0x1000, 0x9, 0x10001, 0x3, 0x3, 0x1, 0xb79, 0x8, 0xb8f, 0x8, 0x1, 0x800, 0x9, 0x9, 0x10000000, 0x6, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffffffffff01, 0x200}, 0x2110, 0x8000, 0x7, 0x6, 0x4, 0x81, 0xef}, r1, 0x6, 0xffffffffffffffff, 0x2) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180)=0x2, 0x4) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x113, 0x1, 0x80000001, "c9c275233f5c7ddc00892b57da1426ad", "1853302e1ec9d47a872f8539bfab5484c4dce06f8c4391ee19a7113c97350b93e6ebc49d99a439957d5119e77cccdaf3304286c3e62530da71877940d927edccbe44d7f3373a5573459ffa2365794ab09f07da3e01be6f71a73709878b68b94f3e084147824c64eac2826f0571a8af21d6dd9bf3309fa553cf04d190f8999e7e4ee80fe99da6fa6c16d0a79e7d45411a6a7d4c5b913e9e5149a8732e693ee6b4d4681a7ef20c74d2cde4ce0f40e10f14166adb39d94f6b904e85f11810ab8b7a221644e48696ef6cfaa6a78af5882a30fdc9609483730face526782284190988e2fb853bf608d212a1ae1324bf500c5aedfe06739e5342b734f926eedb95"}, 0x113, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r3}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000240)) ioctl$RTC_AIE_ON(r2, 0x7001) r4 = dup3(r3, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) 00:18:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x1) ioctl$TCXONC(r1, 0x540a, 0x9) 00:18:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000008b40)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000005dc0)={0x11, 0x0, 0x0}, &(0x7f0000005e00)=0x14) sendmmsg(r1, &(0x7f0000008980)=[{{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000180)="4fd36ae410039b4b8ea1be92c57a3fdcc927f5c307be00e12f22b852b1a56e3d912032e125efb3c8d53a694e5792bda62680c5f1ff74d9e5e2669cb3a0d7dcd4e7cb72b709e0590ee71d0da4b0ff8f232d783445d92980b65d150510c4128d102ef6", 0x62}, {&(0x7f0000000200)="2f122d962880cb56eac7fa54dd210f1bc63a178e3d6f063b1fb82fc3ab9890c49ccc42feb9dd2116bee8bdf190799c5cfcc057", 0x33}, {&(0x7f0000000240)="02ae0f08eddab75588f6347ec09deff740b564c2c0c48f85eb09cebc60d5cd5822cceeab01cff3c0df9636f7191fe5df24e7ca0039f9de116fa7eab5", 0x3c}, {&(0x7f0000000340)="d3734367a39ab8f2509ae43d6261ecc0fd0ce32e3e35887b60d35d326ecf0d8e43c479460d28ba335b1ee39a7f100a525a6fd36fca93a86e3c39a6ab57f59eea88b03fd6d685769050b1ec237dce51bd0fe4567dad42ac06361b333e95801dcc580521771eea9ab1804b5212e92fcb807e83800716f8d9410aa1d665e0cefcb6b07b74a52e1c69708e5c663cbe4b0d31c11d4f2006aed909c712ec9f82b3c45c5c9fb8b2", 0xa4}, {&(0x7f0000000480)="2aa3ab58c0b5871b83ac329ad6e17266fe", 0x11}, {&(0x7f00000016c0)="3baeec3e48917ceafe5c1f0a7c2f26f7ebb244eaca07c40306a8478737188e1b8ce180995f2b89bca0c995ca1de65847c19a6112c7d3ad4ea07d093acde7c5668f7ee38a4f86ae741ff7f53e94220511967089a3c6a2f0180c619a96b1f360556f2c4ce0ad3b93d86b2772d067eac5b6bf635372ba388ae0a92b64175b08194ff9a906d63d91af064ccca9ecb61287a2cb5ebf534f3ef0239014c6e5b6769f5195b628fdfd3b83104d224333cafe3978ead82e4038c911b8489a59c78183cc7831f8e235ab86c62b8c6a66cb43261ba472b16f70ba4976f5b381f7445f33951b661eee6dc68473c3", 0xe8}, {&(0x7f00000030c0)="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", 0x1000}, {&(0x7f00000017c0)="369d3e102ed8e006e81d018c678f090cf6f630c4098bfef594dc04513d2c8cbbc6dadf0b9b1763794e0a80954283cf0aeb51842cd776888c42758ec8676814cca3dd4877a60605b727e2de778042254632471b944094b5ceeee196f098cfb110e094db8b81d851cd7b10759863788dd32d924bba2fdea49cf66f37998bd90b74945261ce13d45113f4bbcf1a888f7d3f7e", 0x91}, {&(0x7f00000004c0)="f312b2bf51730fa01008392f3b512ce2aaffe9c08ce47cedae4e25520f90f71a7db4661b5f45f425d5a7846ae2a39a4e1368a2c142a5323bb12766c4cd7ad28221352886abb4a6ffb7d72d1d61dff461ff6dce0421142ced0441bd641c4259e869e84bdb129a3fcd913afbd17b37", 0x6e}, {&(0x7f0000000600)="1087983ba2c1b983c4b42b40e6caa58cb37d74c2ec583586c00aeddf3b4acc56336b16b76f3d368e6e21f05b66530f056d6e934a85e6732fd94e622bd531e356f8da38da67f9608837aa1c6cd1895ae611d36e58f7059e1bda6c1b929fa0a169", 0x60}], 0xa}, 0x9}, {{&(0x7f0000001940)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000040c0)="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", 0x1000}, {&(0x7f00000019c0)="9590b738ca265d7c69cd407ad185fba0c822c383f83aa261ea21787f9cbc6eb65ce057d1d7ab35ae6554cabf37dc7535578f8a6c45e43ae59ae1f8369f0482a974d61f6b7dd4883b5a96aabfaa271e1770227fd55f1afd58c4de656002a9ea168f3dbd474ec13cf00c71", 0x6a}, {&(0x7f0000001a40)="019e20143c61a736c802061e4a81ee4c0ea2691879a24b5651c447271ce21c", 0x1f}, {&(0x7f0000001a80)="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", 0xfc}], 0x4, 0x0, 0x0, 0xc0}, 0x2}, {{&(0x7f0000001bc0)=@ipx={0x4, 0x7, 0x0, "202872a88eb1", 0x7fff}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)="e5c287f95827ac73915c4e0544d994c42345e0e70a8ca444fba5c52d50708c0b1153b171e65cfcf77941a27b611cc0ff51585fe952f7faf5020a86f89e93edd97da947e494012319e85b80a12f45fafcfc783b272bf86318180e33b63887a530f98d121153160e36f0ead20304ff7e0e69a549eb2c756f68fab1d4a6593bd7777a351d91436e995ffbf584af7242c5445212e18c3d305b1b39ce9f1e53773d4fc009189b76ac7cfd7e85e034cc4bab0150661b949f46fc4a7c73d02ba6", 0xbd}, {&(0x7f0000001d00)="0682fa0dbcfdabfdfd1e409cd0eeac47271ecfb1a3f8790eb7e7640a9af430d0490d79db35a97d39903de059e8775cd4733cc3c99bd0c8286e2a0fe7fed3da193b26ca6d6c1655fcf4140ff274b3393b7f22b3946aa6e6cc74307d6241a681ca8c254cfe318c7af0529e0edda7f2bce35dd59ad98dc97892a5757837ec78522979eebd276d2cbb9894f424d2b3115644457e54e24a0e73865b793c907b31e9b4fe6164b7105165d3a2439b4ef426ed6e2056184699620097f414f89ca184599c1a1f3fac0fb67e6bfa56c5b5403faea3d35e546419117588c3d517d7a818c9", 0xdf}, {&(0x7f0000001e00)="0fcca02925eff9d203d494450d8e896b8cc6eaa3f312cbedcd2bce600ad1a51a96ffbd33b4c8620895d86f5fea1cbedc4f38babf145fb21b4e8dd70f7365ade7753ef0926402fc01d3fd5f8767a26ca65b1f4eb0d1d0af2f7974cc1fa164739e0ec94b15c63f", 0x66}, {&(0x7f0000001e80)="2bdbe59fbab15ec04f99ce5705863403a7cde52f235dcb70e14e428258fb263be727cc0c535dcd79fd45cc17352838af66cefe91706cccdac0e10a11848a1b52cc3da6987a9b217c6e1c6777e591f72c1ac4a0cf3c06cc77ad0af68205e3aa7f816a0ff60cfade486f44b59561786770ecbf8131fec1d2c7ffa3965a79d896905ab86283abf5790991a409ac8076804f63492d182b4c1a42e8663d2a5de34377471da214c5a6728d3bc403413efe", 0xae}, {&(0x7f0000001f40)="5b3976071b9c7de0dcf9d9e3fd9df0d12b4d6e7477ee05c3742d9cae7a37afee1346d66552dc6d92a6541f105536cbc0d09d54c5778e73b26e4bae9e", 0x3c}], 0x5, 0x0, 0x0, 0x4040}, 0x1}, {{&(0x7f0000002000)=@generic={0x8, "46bf7721f2ca8e33ae0f476042b229fd550a53c5a63dab6c7c4c44cb5424c7d1d495792c56412d7c14dac7513a405f31d6dc589d5561d6a9afa6c305a772099197de2ad304ad30967690a93380af9902509f17bfd4a0658ee98571636bf9a1eaa1cdfddc4f5eba60e254f1c3f635610dc128ebd9833147dc7afbbfa5e800"}, 0x80, &(0x7f0000002080)=[{&(0x7f00000050c0)="648ed45cab54c81b28ffef51ce7cd20a8bfc9ab2a076be60a140759a5302759f715da9a1fd8cf7d9c486d720d3f279065712270b2a9e8c2ad7e3819a7b7e6249a7975d33e31642dd90cdf8f63a925584e98994b69a1479f39896053fecef2ec1eaa9c3a64087a31cdce3e66d0e73d999cb8a2c875a13dc943ba770", 0x7b}, {&(0x7f0000005140)="6c832a6093384b2c75bfdd793d23bb33a6ca49c60d618df0e1c410c24b48026cb4f57084828ce3263c61a47e6f7354a9e308deda3db66b6da63fca4d3b135d905d43fa09fbbcf6f75f7894b5d7ec7d5eb7808f46a3bbf9e28b57e98c525ec4de363fd2703261b527b7dc76e9a0fd48b786fc203a1acf9cae24d649be1d7148348e343f3751ab44214613f4ce20afed131670ebd05bae1c8c5fd9a0b31b411e0b226b85261d1721bcde35453337a1b418a344dc78", 0xb4}], 0x2, &(0x7f0000005200)=[{0x80, 0x100, 0x57, "1252f16f7a6e53228b4f4af2863bff94486869243386ac9d5769648850f3f4d830df029d483e1e25730f1754a3351c46ed37c4068fa6c5ce79c0265db52b16ee5f72fcbac21f171dd239d4fa10cbede28a45fd101827254ea3da162ef5e780153fc1b41224021d7d728bfafb3716b38a"}, {0x110, 0x0, 0xfffffffffffffff9, "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"}], 0x190}, 0x600000000000}, {{0x0, 0x0, &(0x7f0000005940)=[{&(0x7f00000053c0)="a078c2a6573f5867c2af0dbf13c2faddc3c4456ef4fd4e6f590fa7555795ffdfd96903829f86060e016ed807209e7fbb63c74bcd3aaee6e4b8bc67c5a280689c00c51a631101a00e051bb5e70f8d9019d2038ab640c34b9d7bdfa4688734865c04f2bb6479019353", 0x68}, {&(0x7f0000005440)="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", 0xfe}, {&(0x7f0000005540)="d42dc2c3eac7b4c92d6447ce8592e6d7bf2805efbf03fe9ca0bbd4fb61e12ec5e3046f126543413ab340dcb40efa0a7dd1992144ee45b09d89cc22ddcd7600d18908203f4bc9d47c45899fde8290e20a4a3c3671f08fd86a2e93d6d71a96600acfa9329fe1598e34de23c7becde1997af1ed3959bacac25d71733ac6c04e602d928858bfe06ec2a47d6014dc51bf42dc2a79c2f883a70aaa95a2dab329454233f867db4485c72c052a5270972286f1954f5badbab77ec7c6e672f85f064b1f32fda602e60cf02cca65940221c1f33a9204c71574385206456e", 0xd9}, {&(0x7f0000005640)="f54d54598c1a59a2b97f5b9cddb7918fcc80a60e273dcc81d17d3198b62e73788a4fea76afb044ba06c91bb1dce24b05b781a4636ed40c9c2dee49534f3372483d5e9a07763ee468b70ad1394a879f8db8c9a7d0454ba06fd780a7523b534ee1d0c3e1190b61b2f44879fbf060d56a9ebd72de880610652531072e4e7dd8dcf4ee81dcb03a63913045a095f788da42e8d3e494555d4230747399dc34602060e4979660d0359ff70892e144056200f98c3a674dc940d77837af10f8e56ba99cd97f7294e411a945a4995b7d4e334e2bb2f151d4c5d9eb488ea4780311f9c7dccf1a1de3a39c1e12d584ce7e26f76e", 0xee}, {&(0x7f0000005740)="58ea63f2ef9cfa7bb8620008b1db5cad39fb9790e8d2c2dc0c4b6264efe56d32a971f0a22d8b1930ff44c5620983ffacd32c6be32061c4c80e0e51b01be48f66504b09fc6f65e49de22c5bdfae2bcb2ab40c84ff01e4049dbc3f6eceed6875302c4ce1e8c9d1c5cd9cd311fff369bb5b28bbc73525a45bfa18f67d5ef12f910c34b0978001a335a105588fcc0c7d43ecc94bb3b5c8d450", 0x97}, {&(0x7f0000005800)="5cb2c4a76287d5589bd93f535034443c36b35dd6a4c902a9775acd5496b8b4d38f743cd56edfa113316957e4e64e427fcdd285dec7023b38d7d26016c400838c3e6e0b871f69627cde20481b353471c5ace109254549515ca36e0c8a2ae733ade134c086a9b0b498d490d677cda0462cf0993234dbcaf8867ceb4baf7c693e5cdf611c8e2c1bef16251153e0566ae6b6e1053ea20eb374dc69577d7210e05c056e17d2a0a6859e697cc790da184290d4f5c3a97beada868349affe5572d4c9ac92f0e2d0ecbe6446104b15751c57a301", 0xd0}, {&(0x7f0000005900)="dc5dc28586d9fb426c8b452939b1c89083353c0236e30401a7", 0x19}], 0x7, &(0x7f00000059c0)=[{0x58, 0x103, 0x1, "c4bca9febcb63572171134c5902cba87c264013e35392090240de5c122dccedabda70a5b067d87be52eb8e6d71d3eec3fb3d2c165f070fe3c31ea631c1bb1e931c4b2c5f4a33e0"}, {0xf8, 0xff, 0x6, "378547cb2fd10a174aff76a04513b742b27861d6ca694e8624f1f92adea7b9e69f81fdc3c4670d0295a51e3f1084cd7488de09afe44c8ef193bf6f4217c1c65464825e8c6223c889fdf50e9fafd428cf56f879b1e734e92f30f19360883ab655a00b1689e46dfe35f3a1bbc36941069ada665fe7c1b6cc64de251242c4e975384bf9d12a37cab444cc3e7d26b9fbd7f91dd75129a306659d15870e0734762806875b9c8a89ee9bba4c8f3009686e190366c67084e77d61c88f60d00a2c00a6cfada9598c2b1896e49de33be8d1152cbb6cc702be7ea4070df8993e120e03c598ab8375a72e177d"}, {0x28, 0x10d, 0x1, "685737450ddc650012542bdae2583c203752ec32"}, {0x90, 0x100, 0xce, "07bb87722d9c8b84cfbead874cf9e1ecf69502ada513011cac5dc8bbfbd35501863a3639b29753dc49d70384c05342ed24586e2c4c2eb11e14cf5ac1aa7bee93276a2883e219a092d3101c5f701b8ef470ea8c2ceb779316f354763be5bc2ca9c3dfcbf34a36c6a2bfbc9d52705b3ed1dc11a706a513b24fff"}, {0x78, 0x0, 0xeb, "1087162cd1d2f95a6c3cdf0d2ad9734238e0840ca440233a83e49ecda578983cf98ff7066e5bf315ce73e535aade7f080059dd410a44793b568d76afa5241f7e2338be0978b48aa2a02fe2604131891fa6c02cd421e9565cc398e7ff070436c89fe0df"}, {0x78, 0x119, 0xff9, "f6ba88376bcd35228442a000dde151a9e8ee4c18fe5446a1903f1d3c6cbcc6a766bc1ba8dca46ea929c7bcaa9d9f5db3239bbf6f97eb352ccfc218fdc3674c99b9a6369f677e35467c72d50a6f84ce76800e545b386a93a36ebad5caacb2f4b2b423b7"}, {0x108, 0x199, 0x6, "54c51a3ae44ea0198c76124944dd8fb7b243c93764dadd62f429b25aba1b56eaf1a2a3e3be08fc07cc8f9539434755c5344fa02ac7e098094065af64225325296dcab33d95d484c3bd9af36eb18f2121678d2dfa1017b77f0f797f10103d66cab625411f3056bc004003affb9ff649b5edec02d5b732b05b9c06db7d1982b2c2ac25cae9a8f85d9039c0ee8663a1c1518e7b9a2c9d2f67b3b7060fa3d02b6218e0578217983bd862222b114ea9376d7dc17fd3eafb3a3d17b6bcfb89036e7b444c6eca14411ab67cadee60672d13478ccba016e67ddea25e64d8d68054fbac59761fa749f49258189eb8930c5c5cb6865081fb75dc49ce"}], 0x400, 0x4008080}, 0x3}, {{&(0x7f0000005e40)=@ll={0x11, 0x1c, r2, 0x1, 0xe8a, 0x6, @random="0b8e8da13be9"}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000005ec0)="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", 0x1000}], 0x1, &(0x7f0000006f00)=[{0x1010, 0x117, 0x2, "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"}, {0xd0, 0x0, 0x1, "ea3f2c739ffce3dd701fac997301e71822d3a9062d5222c41ec633906c715834ec80b6e11d32e6124bc7d22d51354b9530f94a21f98a3853c26f3178445187c430cc41916f74df755febe76b1ca99427de37789514e73a9ab93f05b8546dc6d3a032589e95ee0c17cf6138241d592137afcea3d6c73a3780e6ef7e93bf119cec35566d8e732fa46d446c5d1c2e52d967276ff137bc746d442632ac0817488b2d404518602104869e89111ab7f1be23f30ca74b5e786eb312ad28074b3c"}, {0xd0, 0x114, 0x3, "89ac72d3f68f077abc7a6634d22844f517621d9f6f6e6a0367c452e9efc6d70e097a4dc970c877e6d06e0683d25af92dc39808da72e3f2fa4d041b06ba6fc752c740663680dcb47210a0baaffcdfc667ff8062a3227a4b98edcc9c050e3f2ded859ddfe885067fa74f923fbc933ad13a5dadf52c87eca41dda7ee03727a887faec01c371060786245d6183ff4a2f0325abec561c03c67095114df4045b11dca10cc29289795041ff4c4116f598b1074edd245983e8f0db8b73b53fc83138"}, {0x100, 0x112, 0xfc8f, "c92760eb4d6f8138136a89bec7347630d6816d96caa4b8b693ebb8c6ce037d9bb786896f912d64092ef377b4a5467d5fd6037d5b016c783d6407ce344dce96685a81330f06601e86c2c3846f54ad9a4649d243b895be092b1bf6cca88eb3dd7b9a7d05abc692c4d3cf5550163e4b4c86c7e46d451dafd9e785d1264322bc992c62505f8c475802c5f24b54ea046e824eec8c7e2d2e38eae19108104ad154773d40488097600414c5b46d5e2ed0d4f2b6769fdd973cd7f0b0c2dde67594c69b6a8b6a0038a0fd2c5f959c9f5126e148a1b073e92ce7031c0b02b577c858ad33209e0a8863ff662b88c519e6"}, {0x100, 0x11d, 0x0, "2cb139262721a3ae8aea2bc226d34c01a507e90b534f24d22d5a97d4cac3cf6d1f7e873253ef13ada86c9655d0655ef7bb4c40268ca1a4b0f4561b777ba8fdc6415311d1d6dcf54c02accbb792815367bcf7c6e0d13a03ecd6e8f463b374a58be4dff2d749bcd50938808fb725dae43bd8230d1534bbf42294fa9e0932651cd5ee87470e393258f4d1255cdbf9305c02efd10d0a116564f18aaa181e16f3cad6bc8152cea67fd4b72015d0744591558a50007313b295a7612c07208ea1da51de367ce545fe3edb7689d1980a5bd5dfca23a5cfe0c298e1a225fa315200e16463df71511262c79cf89d8f3951"}, {0xf8, 0x13b, 0x5, "9d45130dcc998d112c73f65507a8f0409b56557318565600a601dbd6327125ae2796be07ac8d0d69b4d3241c5d5ebc80b619eb70e5ee1c44a0e41708ba48386193f7e7710c8d3f73ceb89948a55e6a54a00281ae322e9c458b1cbe7e3a9a4a4224f5e20c76c351d5d725cc1436d341d235acb8f66d9eba0cbfecac8ba516595bde90782791eadb19b157aca91d693037966e4bc9653ced54b7912ef74f815d48716ec109be055bd8a7cebe72beba1e7e35798d9a41f0a77c40c61d8964cd66324ebc70801da901c78f1141de31b2e62165ae2134869323904bc4a35af617b6b935bc659c49e9f19c"}], 0x14a8, 0x40}, 0xdf6}, {{&(0x7f00000083c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x1, 0x4, "816cfa696204e3ea95329fe5c7314c19325a8dea1c9c108d45d66b1223db872b5ba7fdb4eeb1558398068945bf9dc11ca1e7ad46c977c18222911d489e8d1c", 0x9}, 0x80, &(0x7f0000008680)=[{&(0x7f0000008440)="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", 0xfe}, {&(0x7f0000008540)="06e5e3a12a899a", 0x7}, {&(0x7f0000008580)="e6a3e48c18efcae722d10046883e58fcbfc311d81bceabe8b44d2d467702ebcb741ec7b085678b541f8e13b0259ae3928e37754f615a5c7bb6a1485852a72b453556aaf1612eea86dab50be2cd777c9fe50981ce", 0x54}, {&(0x7f0000008600)="38d47ee5a17c2273aebba9a9db7aa8f4a33fdcb6cb0b4725f84ffdd5a3b57178d2d18fb2267e694d8f14685bc4a5ad727bba880402e469ea84e71737e549151b8255d7416a3c052ca2", 0x49}], 0x4, &(0x7f00000086c0)=[{0x90, 0x6, 0x75e, "429b73259b6cbcc451b65021b6a03c180a7a4c6cc043895f7c21ed10200a8a42446ce1d564d3e5f62f770c98b8a7f3d7ac484231ba0fefd4709added9af8033a4591142e10d03ae1cdf41c252c63755b8fcd9e349fd6f2820449de2296840449e538d139172cfeb6fb333b045ad4735bf40d4c09e7442df2876fdfa8d444"}, {0x28, 0x10f, 0x7f2, "3b30fa5e6b645b531159076da9f8e99773a3a0277a"}, {0x110, 0x0, 0x7, "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"}, {0xd8, 0x10b, 0x9, "fd3d8707cf017bba47df9845941c39134f71329420f528ea65cdf9771edf258bb5dfdd0f5f388c20be56bc726ccc2558bb37ce4f8e807bdb337751fb18e6d4f075a6c00a3b1b619b52cc4f4411605ce24df457b597183d094a68083596c93640200d347cc156b1e0a5e1ce24bafc214a0f7b47e2fb5bcd613dc7af2f31cd6c8e736317370d0e3c19e42e966ea39025bcc07af59f5bc842bce8f3a1536621e4a88e7e4839457098b9a6da677f80414dbea17e971b3b740408631e3f6524eb108f44"}], 0x2a0, 0xb9eadce923c78cec}, 0xc2}], 0x7, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000140), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) getpgrp(r0) getpid() ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x16, r0, 0x4, 0xffff) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x12}) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:51 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x8001, 0x68100) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000240), 0x4) ioctl$RTC_AIE_ON(r1, 0x7001) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x64) ptrace$cont(0x20, r0, 0x0, 0x8001) 00:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1000000000016, &(0x7f0000000140)={0x25, 0xffff, 0x7}) rt_sigprocmask(0x1, &(0x7f00000013c0)={0x20}, &(0x7f0000001400), 0x8) ptrace(0x10, r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x82) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000001300)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x6, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000300)=""/4096}, &(0x7f0000001380)=0x78) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000180)="264ac874d98806cf60dd505ddbe44d898b4c5d7b13f52754225f92aed430de2ceb801c6f443755d8671430f9653ed008fbb1d801eb7ce1134716d8983d5628503f43392a1da38ac442efeb3f1815e6c82a9393c36c7f1e2558622c6323056a6904"}, 0x10) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r1 = dup2(r0, r0) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0xfffffffffffffff5, 0x1, {0x7, 0x1b, 0xef28, 0x910, 0x340a, 0x4, 0x4, 0x20}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0xffffffffffffff3c, 0xfffffffffffffffd, 0x3}, 0xffffffba) 00:18:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000080), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0xfffffffffffffffd, &(0x7f0000000280)={0x9}, &(0x7f0000000340)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000180)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x14, &(0x7f0000000100)={0x0, 0x1}) ptrace(0x10, r0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getpriority(0x0, r0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000140), 0x4) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) r3 = getegid() r4 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f00000006c0)=0xe8) r6 = getegid() r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/policy\x00', 0x0, 0x0) r8 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/member\x00', 0x2, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x101, 0x80000) r10 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r11 = syz_open_dev$sndtimer(&(0x7f0000000800)='/dev/snd/timer\x00', 0x0, 0x4040) r12 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x80000) r13 = openat$ion(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ion\x00', 0x0, 0x0) r14 = open$dir(&(0x7f00000008c0)='./file0\x00', 0x0, 0x40) r15 = openat(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0x200, 0x40) r16 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ppp\x00', 0x0, 0x0) r17 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r18 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f00000009c0)=',eth0\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000b40)=0xe8) r21 = getegid() r22 = socket$inet_udp(0x2, 0x2, 0x0) r23 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000f80)='/selinux/load\x00', 0x2, 0x0) r24 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x6, 0xa, &(0x7f0000000fc0)=@raw=[@ldst={0x3, 0x3, 0x0, 0x6, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x10001, 0x6, 0xa, 0x0, 0x24, 0x10}, @ldst={0x3, 0x3, 0x3, 0x0, 0x7, 0x6, 0x1}, @ldst={0x3, 0x2, 0x7, 0x0, 0x2, 0x30, 0xfffffffffffffffc}, @alu={0x7, 0x3, 0x0, 0xa, 0x9, 0xfffffffffffffffe, 0x1}], &(0x7f0000001040)='syzkaller\x00', 0x7df4, 0xc0, &(0x7f0000001080)=""/192, 0x100000000040f00, 0x1}, 0x48) r25 = socket$unix(0x1, 0x2, 0x0) r26 = getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)=0x0) r30 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0)={0x0, 0x0, 0x0}, &(0x7f0000001700)=0xc) sendmmsg$unix(r0, &(0x7f0000001ac0)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000240)="5cc95f1b6d09ee7513398340238403f5b9f155a972bff09e85225891850e4adf51f002b91fde2afaf9b0843fd716ea893795fea54a5caa80a677f39b8300e25d6d0404df7ce728ff4513556ad199c31ee18b9191bf74e92ee498d786cd4bb0130821a41637061b2e11493bd3f0c194213f635fbba5564bd1dd7bd7971ea35fcb20cea3366b92afaa244ccd9481289e700d050ab12226c995f335449084fbe14dba", 0xa1}, {&(0x7f00000001c0)="1bfd45084892e756b211879800f90d4bdcdcaae78d9b6ae1382abcb1494b66dde6368c", 0x23}, {&(0x7f0000000300)="46f534d8189e33192784618b33f367797c18af1511e1ef94aa1b0f5671b6c1e67fd647f1cdd59c993c79235e90b3146941e762aaa13b230452c0ef2dc685022a277ce0d04764bed2bd4c20986b14c0dbad5cc9295364d2094f318dbf497bebe39d6c87ac626d3fe49ed7e9fd0b167a1620c9762cee519e688e63e41b64a5317f79df1864142a74469c4236a43767427f3e730e5b5d050dcccbaaa6", 0x9b}, {&(0x7f00000003c0)="c2775c4306eb7009753484c71ba27020c7d768", 0x13}], 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="0010eaffff3fa27a02d621307823b949995cc42ffd6738ea5b5bcd331aa9fe03b39d3fae9c58a4b2e5fa780a8e21b183e2d7e6627f78dd9a6744a28b5cf860ab7ee824960f5796bafa648c3efd4656ca6e771f7b3065e111b5f574815e582588a5", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="00000000200000000000000001ff000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000030e9ffffff00000001000000d5c5ea45", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB='\x00\x00\x00\x00'], 0xb8, 0x80}, {&(0x7f0000000c40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000cc0)="cbc2f978eda3a5469c69d14c163ff401fabffb90dd750707ea340f2b0a2bb7633b11f13b33d035d5b05be66a73c0d38d4ed85742562306e3d851503fe7c72ed0a1922be91ee83b085fba87064284a93f4c", 0x51}, {&(0x7f0000000d40)="3f6aa40838e8c96c9cfbcb23da7ac7b554908e27a7bb04b9a4097052dfaa926c02f50f015035836599513da12cb4791138e712c6e567db0f71c4250e97c3af2e5550d96a923e5e78ec95ce44bbf6ac2e54", 0x51}, {&(0x7f0000000dc0)="2ec95417b9bf46da4ce2b471fef4e28d536f4a122ab5d4b0b8ae0e63ad2028977ecc305406f01bbf0da25cdd9e249f94f01365de192b2a45db4a67fefbaa528fa17f9d3c2d4045efc4c543b12182a3b739da264f22898a4b762420469403fcb2122fa6d386918fb4be0aa79750d7a1b15c177ff1158c6ce252982789f3c1906cad1cb3890a22", 0x86}, {&(0x7f0000000e80)="b0588e7e69746c3cf2da24dd811c31925ba422ecfdc943f79ac9ad83edb29fd917c6b0b13a8bac282791efe459f531a5de34ddfc9cd533a1705772221ed96f1111cd1b030140a3fabbc3f3f26e38681d8f6ff6fefc9f7cb9b8957c48b9dfc7ab71bc2a462518bb04b0d66ff61cefe25d8947757c12b7e4b827433aa0b0a4283dcd13d12bcce4473f19d9dc5f6d2e", 0x8e}], 0x4, &(0x7f0000001140)=ANY=[@ANYBLOB="200000000000008020a77269b23c7cad16dc5520f9c8b1000183f0dee265666dc9dd101426a53a32966ca339715a84fea0c9092265c8d50b6e5773f4fb10a24d833a1c7e009a055461c1d2", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25], 0x20}, {&(0x7f0000001200)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001500)=[{&(0x7f0000001280)="8bb619f3a05c3cdf10db86e0201af0cd8293e0366bd47ea205826761baf38b0243d37ee5d0bf0d8df91a347d6937fe5a5dd91268928cc0831ce5fbc08af5e3b0bcb457078e9b87a1255c011fb3c9618fb6770a584fe4f0ce53d31650297d4e179d8afde8f1c83bd63d7f3ecaeb08351ad3e317e2e271", 0x76}, {&(0x7f0000001300)="936351425249d32e3c643f1839d637d33dcecc78e904b411d862739bfe08deadfece8e004b7f8e7c00fa5443a3475b8033a53c3c82c86add2ddb2311200a9269d0541e5b09a73dac003c641e8afd890869df8bf507dd3e95eb89349bbcae88182a63d3e47052dc1b3aa6842fa610c5d992cb6a61a513e3d80504b8d0f78ee2e596bfc4e449d81296b77b6af615629721870b159e2e559f087b9b73e9d1011b14eed822b553bc6025f5b6fe0fdae6906f218669a25dee47c537c6ed1e38dc9dfdf019311ce6f1b7efda22cb475938313f472b21", 0xd3}, {&(0x7f0000001400)="94862bab74f771f910e89ad813d7988288d2f117bafc7722bde124ffe33470bc68f179ea6a16d52fea09c5da747810e3aa92ea380276b114eebaac0b924f8a34eeba71a5f12ff7af04e3a3172d9bc94102d2d45903a873a5ada01577c4ad4e93f2d2a5abe943382c569b563c211ee70b98570a3b9c845ae539489ae90fe862068f9cfbfdb52db3015db9b042349f96b4d788de5c43612f02ad5bfcd81fb1f34f15aa2f385906c6e3924a932b96f9f05cf19c728cd94b3e4017a2fff61658f24f05c8694651a875773527d5db6296c5444f12b0aa74ced9c2a28a2641dcc775bb6dfb87949080245be9dc700dbf3f935cce6dfceb8ce9a47951", 0xf9}], 0x3, &(0x7f0000001740)=[@cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}], 0x40, 0x20048081}, {&(0x7f0000001780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001800)="ac776a4184a553ca8f373531d4b66d9587323bf0a31278338db699d461e4c3caf7fd58f77adc2da8e89841f881b765a042fc66307dd08d9cb27f0e6ad5d92027295402de", 0x44}, {&(0x7f0000001880)="1e0e9e51b9ccabeb2b62323535cb013b16ee03ead59a877dba1da34ac6afeb52f7426a0dafac298ad96b3181cb15a5847bfc4e2263c5f0cf6818c15a391f78969dfa55d0a9e8f61d521f0030fc0504cd65dba5fe809e0761d06a7304da3a9ce546307d61dbcdedf9254c1952d7a8a10bc33790ea347ba8db6e64537735d471b4bb8477875ee82f88ef68eaa74ab22ad615aeb860d5969730f9dca4efc500e613091ed24e65f7c491304deb278cfad2b1365d750b8949c6b22816c4073837015d7df307c161191e705f2a9d2e5a1ba6719b24c7687578ffd745dc80c7c21c4f8670a486c7816f3af89a637a86", 0xec}, {&(0x7f0000001980)="9729200a56231d809a9a11fe6458aa673ba472e2691830b04e99370cfe95c9b47163d0238d0b65d83d3ab69620f0a670f36a0e9d08ce78b1b518835ea61c9b08eefa6ae718aec423ee3827fe245471c08fc8b429a4bdb90111ed4f245ab2445a151af8e08f1843d10506b4268fccf803bafa19dd03b731e13b00671e4a8cb897df4675322bbdd7a60dab189c2efd07e0fb", 0x91}, {&(0x7f0000001a40)="2234c7a73ed45fc04514a7604b00fac48f295dde45e1e1b8ef6f", 0x1a}], 0x4, 0x0, 0x0, 0x20048810}], 0x4, 0x1) r32 = getpid() rt_tgsigqueueinfo(r32, r32, 0x16, &(0x7f0000000100)) ptrace(0x10, r32) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r32, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r32, 0x0, 0x0) 00:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) 00:18:52 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = socket$key(0xf, 0x3, 0x2) write(r1, &(0x7f0000000240)="3ffd6929abb7a2c8037acd609918494635b3a314888f4907e728e2a4abd6e0279c073eb290f2d2e2e9cffd1a00c4d62f99e7da0960a2cf23b1dbc42ae673604740e7cc8b929348464655ff34016ab3fe59da02ccc09e284606d12c4ff4c720b64bcf80036605f909ca31a6fbd59aa77701eed80431541021056938ea36845f7bf16c3ebea258f527e5e2b1482482e58b71deadf82f7c773628", 0x99) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000180)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000080c0), 0xbfc) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 00:18:53 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={r0, r1+30000000}, 0x325) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:18:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RWRITE(r2, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x6}, 0xb) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000100)) r3 = dup3(r1, r0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000180)=""/82, &(0x7f0000000200)=0x52) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(0xffffffffffffffff, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:53 executing program 5: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ioprio_get$pid(0x1, r0) ptrace$cont(0x20, r0, 0x0, 0xfffffffffffffffc) 00:18:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_CREATE_OPEN(r0, &(0x7f00000016c0)={0xa0, 0x0, 0x5, {{0x0, 0x1, 0x7fffffff, 0xe80000, 0x4, 0x42b, {0x3, 0x10001, 0xfffffffffffffff8, 0x3, 0x9, 0x3, 0x4, 0x2, 0xcc, 0x3, 0x0, r1, r2, 0x962e, 0x2a3}}, {0x0, 0x4}}}, 0xa0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000480), &(0x7f00000004c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:53 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x8001, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x10000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000001c0)={0x30, 0x5, 0x0, {0x0, 0x2, 0x100}}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1b121e3a6c252171, 0x6, 0x9, 0x5, 0x20, r2, 0x3ff}, 0x2c) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:53 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000003c0)={0xa727, 0x1, 0x1, 0xffffffffffffff9c}) fcntl$getownex(r0, 0x10, &(0x7f0000000480)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000340)={'veth1\x00', @remote}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1c5e560e4102c182ef1353", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x1c) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f00000001c0), 0x4) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x1b, 0x2, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0xfffffffffffffffe}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) openat(r2, &(0x7f0000000380)='./file0\x00', 0x501000, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) syz_open_dev$binder(&(0x7f00000004c0)='/dev/binder#\x00', 0x0, 0x802) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) 00:18:53 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x20801, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 00:18:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) getdents(r2, &(0x7f0000000400)=""/135, 0x74) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r1, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) 00:18:54 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180)="c6fc321cc4a469721b7b9ef80aa10fbfaee34c4715e0b0df333f989b19ccd8d238aaa63fe54fc6b6970c15803ca154711f5a2e39b0e42bc56aa52e1f32371ee2840395c321e809932d", &(0x7f0000000240)=""/167}, 0x18) r1 = getpid() readv(r0, &(0x7f0000000680)=[{&(0x7f0000000380)=""/200, 0xc8}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000480)=""/233, 0xe9}, {&(0x7f0000000580)=""/209, 0xd1}], 0x4) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) prctl$setmm(0x23, 0x3, &(0x7f0000ffb000/0x2000)=nil) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="0000003b67e22c1aa18ab4de837ea80adb120c7c285b8b3929a9a75ed46362382cd2e3d7bc3e33a946008068f61fb978ff9f951b49bf6f4b2cc308bf81b7c06a6ff1c717c7c6f43c6f191a852270fb21c879d8bd77d4af7db788eadb8f1aa60599ccb91772942b20c1f80b4c31848d8ae01dcad9f6e891f7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'dummy0\x00', 0x200}) 00:18:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='tracefs\x00', 0x10804, &(0x7f0000000200)='system.posix_acl_access\x00') read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:54 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000180)={0x0, 0x0, 0xffff}) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:54 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) getpid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket(0x15, 0x1, 0x0) sendmsg$key(r1, &(0x7f0000cd0000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85000)=ANY=[@ANYBLOB="020100000c0000000a000000000000000000000000000000001d34ffe0000002000000000000000005000500000400000a0000000000000000000000000000000000ffffffff08ff000000000000000000000000000000000000000000000000"], 0x60}}, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000000240)="acf90a3d7bc300ffedcca0ac5c30c86908b0eaec0d0d59293365b1ba48a6f89b152f3eacc97a034b1e583b87208274e67e98969636691d81ac747932964daf7aaae78674b806984a5320027f0c5894c076a84cfa", 0x54) ptrace$setregs(0xd, r0, 0x7f, &(0x7f0000000180)="a3deb56d56e1936c1f064cb86b6c72885b7483e716d72b9397cd72bc6b31bcdd36432c514d071e0a5e6fb662247d2562f356f1df290b85cb6e99893342533f8a26") ptrace$cont(0x9, r0, 0x619399d9, 0x10000) 00:18:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6dda2ab6ab291bdf0fb24069dd409d832941d6ab8af46e36fcb254a93f154ffb9b25269cb9c14b7affbe9a2c74022dbcd857f89f6bdcb02179befee408eedd6354992ea026913ae7ba0cdd1571b5741b7ee0746ed21bccfa6e6740b0a7f9a5693854aed9c0dbecc678a540e20b25d142f80484c6af1bc4992f3880b4e3f253c5cc8decf8e492ca19e21daf1155eb1e5f82c487e0d3ff18d8692f9a4898230710cd823e64e646f0546bd9e540dea41030c02b7dd98a431064a823777e64d9dd27120cd67f51af0d26cd853b12f2199d843e069404bc703060f2b78b2b2c104f03122b", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dd7be21a5db9b95a767c6752eb3b91a8c4bd202dfe689c7ff8362b82a1dfbd49ae85136acdc0f8074e94b7820157cf5bc2c1f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) ppoll(&(0x7f0000000080)=[{r0, 0x80}, {r1, 0x20}, {r1, 0x8084}, {r1, 0x1}, {r0, 0x80}], 0x5, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x3}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x753) read$FUSE(r0, &(0x7f00000030c0), 0xffffff53) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:55 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) socketpair(0x11, 0x3, 0x8000, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={{}, {r2, r3/1000+30000}}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) dup3(r1, r0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='H', 0x1) 00:18:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x4}}, 0x50) 00:18:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0xec, 0x0, 0x10, 0x5, 0x6, 0x1, 0xbc92, 0xfffffffffffffffd, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x2000000000000175, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x7) r2 = dup3(r1, r0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:55 executing program 5: clone(0x42102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) rt_tgsigqueueinfo(r0, r0, 0xf, &(0x7f0000000140)={0x29, 0x5, 0x8, 0x8}) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace(0xffffffffffffffff, r0) ptrace$cont(0x18, r0, 0xfffffffffffffffc, 0x400) 00:18:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="67643d9ce15555d59e58476e4dd9d7c4841ef0a30e160b8c6eafc8db3e6191cb7ce33e56e16d9e32118c1138", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x4}}, 0x50) 00:18:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040), 0x0) 00:18:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC], 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x880, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 00:18:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x4}}, 0x50) 00:18:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) write$P9_RREMOVE(r2, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:55 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x10000, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0xffffffff80000000, 0x7, 0x8000}, 0x4) socketpair(0x0, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x1ff) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0x0, 0x1, {0x8, 0x9, 0x0, {0x5, 0x8, 0x401, 0x1f, 0x22cdcefa, 0x1, 0x2, 0x42ca, 0x100000000, 0x4, 0x9, r2, r3, 0x5, 0x9}}}, 0x78) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8}}, 0x50) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000017000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x1d, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00009da000)=r0, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f0000000080)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:18:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8}}, 0x50) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x80003, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000001c0)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x1d) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000180)={0xfffffffffffffffe}, &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000140)={0xfffffffffffffff1, 0x0, 0x1, {0x7, 0x1b, 0x8001, 0x0, 0x9, 0x0, 0x800001}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8}}, 0x50) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000007700)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000007740)={'filter\x00', 0x6a, "e5aa966e90bc503868933be3cdbdf7b204c0e57664725c98723bad7e8001e2b2e4587cf188b343fe4a89f3d80f14252e40a0b2c89efd77d95b49ee665d2cb47417c39e1eb46286bdf62b8310380694d2c5e3e5841a62739780aa51d87bc22e3ce86e3ce2cc6efc87bc5d"}, &(0x7f0000007800)=0x8e) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xfff, 0x5c, 0x7, 0x1f, 0x0, 0x1, 0xc008, 0x7, 0x5, 0x81, 0x2, 0xa3, 0x3, 0x20, 0xcd84, 0xff, 0x9a15, 0x6, 0x0, 0x8000, 0x3, 0x7f, 0x0, 0x3ff, 0x200, 0x0, 0xca, 0x2, 0x4, 0x8, 0x6, 0x1, 0x3, 0x7, 0xffffffff00000000, 0xbceb, 0x0, 0xec, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0xc00, 0x3, 0xe00000, 0x1, 0x8000, 0x3f}, r0, 0xf, 0xffffffffffffff9c, 0x8) fcntl$lock(r2, 0x6, &(0x7f0000000240)={0x0, 0x3, 0x3, 0x80, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC], 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:56 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2001, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) signalfd(r0, &(0x7f0000000080)={0x15c}, 0x8) ftruncate(r0, 0x6724) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000000)='/dev/ptmx\x00', 0xffffffffffffffff}, 0x30) ptrace$getregset(0x4204, r3, 0x207, &(0x7f0000000100)={&(0x7f00000001c0)=""/216, 0xd8}) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:56 executing program 4: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000240)=""/119) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fdatasync(r2) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000140)=0x802000, 0x4) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:56 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = gettid() ptrace$cont(0x1f, r0, 0x40, 0x3) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) socketpair$inet6(0xa, 0x805, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f00000001c0)='syzkaller1\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@local, 0x8, 0x1, 0x2, 0xb, 0x73ecb035, 0x1ff, 0x1}, 0x20) ptrace$cont(0x20, r1, 0x0, 0x0) getpgid(r1) r4 = dup(r3) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000240)={0x8, 0xfffffffeffffffff, 0x2, 0x100, 0x3ff, 0x101}) 00:18:56 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0xfffffffffffffef1) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x3f, &(0x7f0000000180)="3c9203864ad948da86af3cc883bca3840d26ed59d5b41358", 0x18) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)=@random={'trusted.', '\x00'}, &(0x7f00000001c0)=""/162, 0xfffffffffffffdad) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000016c0)={0x89c, {{0x2, 0x4e21, @rand_addr=0x1fdf71bb}}, 0x0, 0x1, [{{0x2, 0x4e21, @multicast1}}]}, 0x110) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1, 0x8}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x80}, 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:18:57 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240)=',\x00'}, 0x30) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x3, 0xff, 0xff, 0x3f, 0x0, 0x40, 0x20000, 0xb, 0x2, 0x5, 0x4, 0x1, 0xe68, 0x401, 0xcca0, 0x5, 0x9, 0x7, 0x9, 0x0, 0x1, 0x8, 0x19, 0x7, 0x10000000000, 0x1, 0x1, 0xf906, 0x7, 0x7a, 0x4, 0x101, 0x7, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000140), 0x5}, 0x10000, 0x9, 0x5, 0x3, 0x3, 0x0, 0xb537}, r0, 0x9, r1, 0x2) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0xfffffffffffffffd) 00:18:57 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:57 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) sched_getattr(r0, &(0x7f0000000180), 0x30, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xb, r1, 0x1, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC], 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40000000800, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f00000000c0)=0x6e, 0x800) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x4e23, @multicast1}}) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}) r2 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000140)=[{r2, 0x45a}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f0000000380), 0xfffffffffffffc88) socketpair(0x0, 0x1, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) dup3(r2, r0, 0x0) write(r4, &(0x7f00000000c0), 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)=0x5f) write(r2, &(0x7f0000000000)="c8", 0x0) 00:18:57 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 00:18:57 executing program 4: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x28}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) prlimit64(r1, 0xd, &(0x7f00000001c0)={0x6, 0x4}, 0x0) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000002c0)="996a0d7c18b05cd0267f5ab5ac79ac587515a9b2ed72ec9a9b424212c33ff5d35cb4399298981c16", 0x28, 0x0) keyctl$set_timeout(0xf, r2, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:57 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = getpgid(r0) sched_setaffinity(r1, 0x8, &(0x7f0000000140)=0x4) ptrace$cont(0x20, r0, 0x0, 0x0) uname(&(0x7f0000000240)=""/156) 00:18:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x26c140) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0xfffffffffffffffd) syz_open_pts(r1, 0x0) write(r1, &(0x7f0000000040)='X', 0x0) ioctl$TIOCNOTTY(r2, 0x5422) 00:18:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='xL']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) delete_module(&(0x7f0000000240)='rootmode', 0xa00) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x284001, 0x0) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000200)=0x6e) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:57 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0x637, 0x3727d82d, 0xffffffffffffffff}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfd, 0x2}, 0xc) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:18:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:57 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:18:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRES16], 0xa) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:18:58 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) prlimit64(r0, 0xf, &(0x7f0000000140)={0x9, 0x2bf8}, 0x0) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:18:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="76643dc595fe49c689aff5a8633021380ce345cc610b1d6986848aadb2c260d71457f97a1537a6e1af6cf67e04e07ba713d1a354d41ff6cd60b6ea393d21cd2084564c166735d36b4207e265da529563110cb857799b39809ab66092766ecf7bcff436e91e73fb9ffdeb9ed4293d9d1316e1dfcb769d814ffcd2a9a816b150e800000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000340)=0x9) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) mkdir(&(0x7f0000000140)='./file0\x00', 0xa1) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:18:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000200)={0x18, 0x0, 0x1, {0xecc9}}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x3, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @dev}]}, 0x24}}, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000180)={0xe, 0xa, 0x2, 0x8001, 0x48, "9c37fcd1b159d3c157c71c44463b687108417f2fb9f5fd367dcd3fd902b7cf58a7c8d1aee30e6cbaf35e7fd52d8a3baf28dcf371727492168fcbd8845f54d2d4dfaa19f28ada6ac9"}, 0x54) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:58 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) [ 680.529681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pig=4127 comm=syz-executor4 [ 680.560743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pig=4127 comm=syz-executor4 00:18:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}) socketpair(0x14, 0x2, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x16) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000000c0)=0x50) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) r4 = getuid() lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x6, 0x8fd}, {0x5, 0x93fa}], r4}, 0x18, 0x2) 00:18:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x3ff}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x4, 0x3}}, 0x30) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x10000000000000, 0x2}, 0xffffff37) 00:18:58 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:58 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) 00:18:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) recvmmsg(0xffffffffffffff9c, &(0x7f00000071c0)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/78, 0x4e}], 0x2, &(0x7f0000000480)=""/154, 0x9a, 0xfffffffffffffff9}, 0x1}, {{&(0x7f0000000380)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/135, 0x87}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/162, 0xa2}, {&(0x7f0000001700)=""/206, 0xce}, {&(0x7f0000001800)=""/53, 0x35}, {&(0x7f00000030c0)=""/4096, 0x1000}], 0x7, &(0x7f00000018c0)=""/182, 0xb6, 0x3}, 0x7}, {{&(0x7f0000001980)=@nfc_llcp, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a00)=""/86, 0x56}, {&(0x7f0000001a80)=""/197, 0xc5}], 0x2, 0x0, 0x0, 0x18f}, 0x7}, {{&(0x7f0000001bc0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000004140)=[{&(0x7f0000001c40)=""/251, 0xfb}, {&(0x7f0000001d40)=""/11, 0xb}, {&(0x7f0000001d80)=""/143, 0x8f}, {&(0x7f0000001e40)=""/74, 0x4a}, {&(0x7f0000001ec0)=""/126, 0x7e}, {&(0x7f0000001f40)=""/173, 0xad}, {&(0x7f0000002000)=""/85, 0x55}, {&(0x7f00000040c0)=""/82, 0x52}], 0x8, &(0x7f0000002080)=""/46, 0x2e, 0xc9ea}, 0xff}, {{&(0x7f00000041c0)=@ipx, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004240)=""/166, 0xa6}, {&(0x7f0000004300)=""/15, 0xf}, {&(0x7f0000004340)=""/76, 0x4c}, {&(0x7f00000043c0)=""/222, 0xde}], 0x4, &(0x7f0000004500)=""/54, 0x36, 0x2}, 0xffffffffffffffe1}, {{&(0x7f0000004540)=@rc, 0x80, &(0x7f0000005700)=[{&(0x7f00000045c0)=""/153, 0x99}, {&(0x7f0000004680)=""/122, 0x7a}, {&(0x7f0000004700)=""/4096, 0x1000}], 0x3, &(0x7f0000005740)=""/5, 0x5, 0xffffffffffffffa0}, 0x2e}, {{&(0x7f0000005780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000005800)=""/224, 0xe0}, {&(0x7f0000005900)=""/22, 0x16}, {&(0x7f0000005940)=""/175, 0xaf}, {&(0x7f0000005a00)=""/108, 0x6c}, {&(0x7f0000005a80)=""/49, 0x31}], 0x5, &(0x7f0000005b40)=""/230, 0xe6, 0x9}}, {{&(0x7f0000005c40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000070c0)=[{&(0x7f0000005cc0)=""/243, 0xf3}, {&(0x7f0000005dc0)}, {&(0x7f0000005e00)=""/99, 0x63}, {&(0x7f0000005e80)=""/18, 0x12}, {&(0x7f0000005ec0)=""/131, 0x83}, {&(0x7f0000005f80)=""/242, 0xf2}, {&(0x7f0000006080)=""/48, 0x30}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x8, &(0x7f0000007140)=""/78, 0x4e, 0x8}, 0x985f}], 0x8, 0x20, &(0x7f00000073c0)={0x77359400}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000007400)={{0xa, 0x4e23, 0x0, @loopback, 0x8}, {0xa, 0x4e21, 0x3, @local, 0x401}, 0x9, [0x9, 0x5, 0x8001, 0x4, 0x9, 0x7, 0x7f, 0x1ff]}, 0x5c) 00:18:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x8001, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0xf, 0x4, 0x9}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000340)="be100f2c3a212f297d7c7f55c6c1fa1c462e9d03821e425a05a75bc35c2b7520b8efebd91727287999b4bf1b71b5a135d18a9b3c0937a19e5b634915307ed90c66eb9ed48478a430a74e226d52285705ce988b03aa52b9c95a6eea094f16a74001c54511c054e09f2ea26bb9ebd9c01602fc54f1416f15e7c1bfa3088828ff18c399b7a58412495312db9c838c54fc0a155a8ba786646d8065425db2b89b0cff1ec5fbd85065e4dd864320be47a9694b253eb0b5e1932812d06b3dcaa7eec0e0101eac7bbf37b34376995531fb5c6f81e8844d6c69fe09", &(0x7f0000000200)=""/71}, 0x18) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:18:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/enforce\x00', 0x40, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x10, &(0x7f00000000c0)={&(0x7f00000001c0)=""/115, 0x73, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r2, 0x4) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) 00:18:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRES16], 0xa) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:01 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x480, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000180)={0x14, 0x49, 0x1, {0x80, 0x1, 0x101}}, 0x14) ptrace(0x13, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:01 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) 00:19:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="000000ab23773d0470c71f7011698ac90382e190237c2625d71ab101c297a7e5660ec426abbcb79e2acd9efbce7008bd43eb7c277a02f686a77d5ebfa1e5484cfb3ecf57baf54a04d358efd15f53b709ad3bd6113197e840049eaa4fc715acb911ae6c56f4f813a57d319f7ccc423daedaafff1e59bfa4d7f6b16cc68acb9f44fc7f1b7dc9aba87f500362b0b84428d13c7359e1d5e50efd782d4547cfb9eaa55b0013f482125e2835c5c0a38e7b122645694d0bf301342d15495b73a8f0b39a080b17f0dcecdb13836e98fbf9557bfa5ce1470000ee25f19fd45ef762", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="031469da8dbd2a01fb5a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) sendfile(r0, r0, &(0x7f0000000140), 0x1003) r1 = dup2(r0, r0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x40) pkey_alloc(0x0, 0x2) write$FUSE_INIT(r0, &(0x7f0000000280)={0x33, 0x0, 0x5, {0x7, 0x1b, 0x0, 0x204, 0x7, 0x4, 0x0, 0x4}}, 0x50) 00:19:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x5) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001780)='/dev/null\x00', 0x80002, 0x0) dup2(r0, r1) setsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f00000017c0)="ecec96650976223e9c4ae84bf39ba23fe41ec32f889669026932dd943d1ecf11c759e12c5368441671477967e5a2cb4b0645583f316b", 0x36) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) ioctl(r1, 0x72, &(0x7f00000000c0)="a8d77ae032a389844681a53f2d75dcb5f272a0547992381e8f6c7efad4fadd4ae034c357047948b77822cae8e43e924a38dedc903a2a00ba19783c3f31200bce9d0cf5f94c2c6e50009892233810e418e306acf46c166a19829e02ce865e3231a0dba4758e1bb456916a4273ad07ed433e38cc8e882c5e9700cc55ee8832b124e1691d02c3875b07107cc8af43171070d4186b21fa") r3 = dup3(r1, r0, 0x0) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x100000001, 0x8, 0xf7bb, 0x1}, 0x14) 00:19:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000019c0)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f0000001ac0)=0xe8) stat(&(0x7f0000001b00)='./file1\x00', &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r1, r2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030302c757365725f69643d8a39cb4da9db835ba9b73f6c676c39a8ac7f8090a52f4ebcdf553ca948e183e006000000000000006088f5521bbf062d4778305d3571a0a9048d608d4f051006f110d902e242a689810b11b5bfb640477acf034b3e6cc52b9c7372b17afbe87ab4cf230e398eda1352831c82f1f1370025d979a3178cfd4adda497cec36d9579fc4cc33c022a64cec79fcf32bce4ae583a34f08247822a49d600", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r3, &(0x7f00000020c0), 0x1000) fcntl$setpipe(r3, 0x407, 0x7f) read$FUSE(r3, &(0x7f00000006c0), 0x126f) fsetxattr$security_smack_transmute(r3, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x2) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0xc) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0xdb, 0xc2, &(0x7f0000000400)="70eb3b40e1221cbf19b20a72e67a3b1e405d07c62ead1f95780904707c8fcadcb8e187e1d014de3b448c42c3da2c2ec9161cc8c874b2e44b130a532a5ff13bc93d070ffdc4621080810243a65ea35f9d0694f5e3a49a719d014be8e05d823fd7e50e9d7ca91cd55650c0cc79d153bae71908ccb7f76ed8c16593d9b6e8d22def5a237a8d759b86b5a5a27d9ed8048bcbf75d22f6e7c681501ee86c3e6e17c6869af2b5db6aba5d4c5b5cfb98a9cf33ea26c4a3422cbbdf7d6a22605cea5cee475ea71613b3ad56b370fadf9dbcd6b95130df4e5626d3c5ab851f3e", &(0x7f0000001800)=""/194, 0x7}, 0x28) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'system.', 'ppp1\x00'}, &(0x7f0000000240)='fd', 0x2, 0x2) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r3, &(0x7f0000001900)={0x10, 0x0, 0x2}, 0x10) 00:19:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRES16], 0xa) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() write$FUSE_LK(r0, &(0x7f0000000080)={0x28, 0xfffffffffffffff5, 0x6, {{0x4, 0x10000, 0x0, r1}}}, 0x28) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@v2={0x5, 0x2, 0xe, 0x6, 0x84, "ccda07cbea888517af0401f679bff533aa902ad7c57c486cae6911ed599c68564a58dc6f24dfeec2453aa8278ba67fbbf2c3720dc366395b1457e6d7dac5a31d41ca5a6a7bb50c3a5da4fff12d6ed2a96ce506bdb20a7b3863537f123c78bc0c0938e4881af1b6021059411f361fd453bb9653701ee0aa60d10d17a358038684f229bb19"}, 0x8e, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) ptrace$pokeuser(0x6, r1, 0x5, 0xffffffffffffffff) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:01 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = getpgid(0x0) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000001240)={&(0x7f0000000240)=""/4096, 0x1000}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001280)='/dev/null\x00', 0x200080, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000012c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) r3 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x80800) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000001c0)={0x0, r4, 0x3, 0x2, 0x3, 0x1}) 00:19:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) 00:19:01 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:01 executing program 5: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000003c0)={0x7}, 0x0, &(0x7f0000000040)={0x77359400}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$getregs(0xe, r0, 0x6, &(0x7f0000000140)=""/107) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000380)=0x7fff, 0x4) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000240)={0x5, 0x8, 0x7, 0x2, 0xdf}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r2 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='eth0\x00', 0xfffffffffffffff9) keyctl$clear(0x7, r2) unlinkat(r1, &(0x7f0000000280)='./file0\x00', 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:01 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="5203e3dd66fc908c643d4dff6b012fd0c168da19671b527dad7284acc51e29c1e2e55c45da1f7609104e5abd0a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:01 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000853000)=""/255, 0xfffffffffffffc5b}], 0x1000000000000018) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='personality\x00') ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000001c0)="0a9217fef71338970213794cbc5e7a4f88d8bbb4051ba11ba664d7ecab11eec2ad96903db0b36f82af66f010aa1f517fc1220b62ff5b1938eed26f02c21a828b6851c280c264c574279c370664e299c8744a135afc94e669845d17763f1b9b016f7570bd84137814a6bc27d42fce5620e2e8a0689bdd") ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f00000000c0)={0x9, 0xfffffffffffffff9, {0x52, 0x9, 0xffffffffffffffed, {0x800, 0xa3b8}, {0xfffffffffffffff7, 0x5}, @rumble={0x0, 0x7671}}, {0x57, 0x2, 0x240, {0x2, 0x7}, {0x80000001, 0x100}, @ramp={0x8, 0x9, {0x7, 0x7, 0x1, 0x5}}}}) r4 = dup3(r2, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000140)={0x8, 0x1000, 0x3, 0x1}, 0x10) 00:19:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYRESDEC, @ANYRES16], 0x16) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:02 executing program 0: r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x400, 0x1) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000340), 0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='/usr/sbin/cupsd\x00', 0x10, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x2, 0x4) 00:19:02 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:02 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) timerfd_settime(r1, 0x3c0556709710ea86, &(0x7f0000000140)={{}, {0x0, 0x989680}}, &(0x7f0000000180)) 00:19:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dfbf47734cd5e30b6c096447282c7bb9668b9c767fa29a4d5c69380874825b8fb459fc6a80f44a323e7b3f2982f1e5f2919750fecf77ccfc410e6886ffab79f89dcf88d3832f70899804480e572ecb32eca0e", @ANYRESDEC=0x0, @ANYBLOB="00000000050000000002ce903dae290668fd6669ece672a0710385a9c2bbfa7c1b49232157334bbf10fe24b9039f6c0e23d603c7a815cde9a2f9b96dcb3aa4423c1a9fc856ae75fc11b4fc19e854d001f720fa197b99b079ddffcf0dbf6628ead1e2e91795afda6603f4e7847a652f5dc01a07678dcb6ff9c1e1633be8277030127559260f595a991d679744dd3514facec5276041f0001a01353182b5211f45d32f3afea0ab264538700a944c1df4", @ANYRESDEC=0x0, @ANYBLOB="2c006902292573aa4740173f8ddc597182ecdba3bc56c0add620fa89a8a06b52cd71e0351fd4ceaf221de881e37419958f0618a46cd6d67220ddc8f9c869a4902eebab4aeb7416cc2e387d7b839695a29560ffb031ab56f4cfdaaa4e2d57026c422840f9520a0d6c515b8a3d70f598f89e9f87c61bf9ff82feff58f81642d2a7be4c99bee8789f8f1891ae4f64175ac43a3f9bfc4fb20ae9dfff11e1311be327b08583efab1350a52e1014c72c7fac4301c198db10e6302a9c2182e49ac29403a92095e8ade3a1f11b460b180b4664eabba544661b24f78798eeec2ebe3a11fed6c3872d000000000000000000000000374a8cbd582b6200000000d92869b8aa6fc782c6f2c1fb05ecc9a3f090daf4e602dac20846ebc84ddbe29c442f594b052f9c24a2be864350fa664d43901652743ccf96beb7ce318acf794ff50d74d95819b92d94ecfad2c4c40bf3a927326ef7a1499fc37bb904b2579a836f4081a3838426fd8ace4a14cc6f6a9fda7b16557ce94dd3fcb306318a8aa23ecf3a4e6effcf51699560451fc5f241d0f7a8049f4cf3de8204e4889a48fb9bcc51b558ac86a6a47777b8ef7415ed7628bfb5cb0d3759b7d0295c9c7788194727e4af779a5204205a12"]) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001bc0)=0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001c80)='/proc/self/net/pfkey\x00', 0x42040, 0x0) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f0000001cc0)) capget(&(0x7f0000001c00)={0x20080522, r3}, &(0x7f0000001c40)={0x2, 0x7, 0x9, 0x8, 0x3, 0xb9c}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) r8 = getgid() lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001940)=[0xffffffffffffffff]) stat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000001ac0)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}, {0x2, 0x5, r2}, {0x2, 0x5, r5}, {0x2, 0x0, r6}, {0x2, 0x2, r7}], {0x4, 0x1}, [{0x8, 0x5, r8}, {0x8, 0x2, r9}, {0x8, 0x3, r10}, {0x8, 0x4, r11}, {0x8, 0x7, r12}], {0x10, 0x3}}, 0x74, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r13 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001b40)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCGETS(r13, 0x5401, &(0x7f0000001b80)) iopl(0x4) r14 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$EVIOCGBITSW(r14, 0x80404525, &(0x7f00000016c0)=""/234) r15 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xa0080, 0x0) ioctl$KDADDIO(r15, 0x4b34, 0x3) 00:19:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x541000, 0x0) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x100) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:02 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:02 executing program 0: r0 = getpid() waitid(0x3, r0, &(0x7f0000000140), 0x80000000, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_STATFS(r1, &(0x7f0000000340)={0x60, 0x0, 0x1, {{0x993, 0x10000, 0x7, 0x0, 0x800, 0x0, 0xffa, 0x9}}}, 0x60) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x21f, 0xffffffffffffffff, 0x2}, 0xffffffffffffffb7) 00:19:02 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000180)={{0x77359400}, {r1, r2+10000000}}, &(0x7f00000001c0)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r3, 0x0, 0x0) 00:19:02 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000400)={0xfffffffffffffb6a, 0x100000000, 0x1}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}]}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:02 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = getpgid(0xffffffffffffffff) setpgid(r1, r2) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0xffffffffffffffff}) r3 = syz_open_pts(r0, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000001c40)=0x8) ppoll(&(0x7f0000000300)=[{r3}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r4 = dup3(r3, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) fstat(r3, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000001500)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) fstat(r3, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000001bc0)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000140)="e5521a248c", 0x5}, {&(0x7f0000000180)="2f70d657f57a0bcb4c27811e8265a50349c990cd335ba08dbd1ac7cf170b726d6ddc501babeeb41e6617eeaf46433472ecf4d699975af6edc609a0783acafd6cc8a26b08e181407b64b9a841b6dff80beeedd954ef0ecafdf5c349ba6096800b66ccde27534cc2c3a2ea9dfe3e42e5d7092501ef86cc4ad69a98944e2b7e763223bb427924fd7e27294193063577703679ad2036a0e5277bc173b3fcb3cbc44f60408b01f494bec3802f7008db3250ce6f1d19c9c2e7ae1f5f97d38473a2d3446af5fb895ab5c006e9d14b9290bb3c78f6ca4675cfc1c31d48ccb9808ef40e436f37abbb5df906c4136c", 0xea}, {&(0x7f00000013c0)="57406ce7d02323721e9c77d7127dc505957210be7dac5943db5e44a68ded260950efee117d07e69fc8e7c4f199317c14c2a68a10a72fc4df5a5269cb3e2464b0ca50e91603396219fcb5d3d85fe29605f494e22e35d81d3c14b671891867ab0f0961d27d84af0b032020200471d1d246233d4a9a8caf4f41f5572af615a95144ee", 0x81}], 0x4, &(0x7f0000001680)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r3, r3, r3, r4]}, @cred={0x20, 0x1, 0x2, r1, r5, r6}, @rights={0x28, 0x1, 0x1, [r4, r0, r4, r0, r0, r3]}, @cred={0x20, 0x1, 0x2, r2, r7, r8}], 0xb0, 0x80}, {&(0x7f0000001740)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000019c0)=[{&(0x7f00000017c0)="29253902de72c3c7c5a8c940274237abfe7418aea0f4da6a3b062d073ac31cc043e4698c2519bb3307707625fbb4ca2c", 0x30}, {&(0x7f0000001800)="81f75f4378fcffcc98fc48113e6b93f6b111a42f44424c2119bdfff817ec877f2ac97b969cb179ee3d885b719408fb68a475199bc4a43df4e562f4914253dca4850eec6c4886905337eb2687132b59e2abe1821444bee5c15db75c734268310211537d086fbf02ca3dc9340ccfaeb0167a06981e51d5a8286cb9b82756e68f281ef116b0ce4a913ee2f996a5964a4e296242260c19f81bc414a2e5c75926ffece852a2c4d251fb3a6a59e4133e95d779e30efa3d2826600d9542c5e0d8e435629a1528f4f6bcb114d246e088313174fe10e01f21c22974bd1214d18f86bc2b1acec1a1f2f338ce83fc90f6b155c4c836005cbf54", 0xf4}, {&(0x7f0000001900)="79cfda7e2d12bbcd3e1f4d2c028c7f9901316173aa9473210cb64514a710317d8dc1a73fb749ea27f0f0b7d5b79bd9e9ce785929e7c93a10f99dc74053a919767f84af9819ef41623f4303babf29b1cb4744d551050f49397b6c6cd3dd067902a415dd76362f43ef393cfd4b4e526823958cada072777bcb4affc6275667515607bfd2ac6241a8cced2a30772236b980b732ce8b35ab05f292493e121a219f1cd7621f43313145998f1fb96c1c22c34a60b31a09fdddb04a9e4b89a9731656", 0xbf}], 0x3, &(0x7f0000001b40)=[@rights={0x20, 0x1, 0x1, [r3, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r9, r10}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x60, 0x8001}], 0x2, 0x4000000) 00:19:03 executing program 5: clone(0x2102002001, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x28409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x2) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000180)=0x100) ptrace$cont(0x20, r1, 0x0, 0x0) 00:19:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'cpuset&#bdev{:'}}, {@smackfsdef={'smackfsdef'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'em0'}}, {@smackfshat={'smackfshat', 0x3d, 'fd'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vboxnet0vmnet1loð0bdev+posix_acl_access\\wlan1bdevselinux'}}]}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYRESDEC, @ANYRES16], 0x16) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:03 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) getuid() accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$inet(0x2, 0x1, 0x340, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r1, &(0x7f00000016c0)=""/241, 0xf1, 0x10000, &(0x7f0000000480)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x80) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x15) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x11e) getsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000180)=""/222, &(0x7f0000000340)=0xde) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:03 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x800881, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}], [{@context={'context', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x78) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:03 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:03 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth1_to_bond\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000480)={'\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) ioctl$sock_SIOCGIFCONF(0xffffffffffffff9c, 0x8910, &(0x7f0000000680)=@req={0x28, &(0x7f0000000640)={'vcan0\x00', @ifru_addrs=@xdp={0x2c, 0x2, 0x0, 0x34}}}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000880)={@local, 0x0}, &(0x7f00000008c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000900)={@remote, @loopback, 0x0}, &(0x7f0000000940)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000980)={@dev, 0x0}, &(0x7f00000009c0)=0x14) getsockname(0xffffffffffffff9c, &(0x7f0000001100)=@hci={0x1f, 0x0}, &(0x7f0000001180)=0x80) accept(0xffffffffffffff9c, &(0x7f00000011c0)=@can={0x1d, 0x0}, &(0x7f0000001240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001840)={&(0x7f0000001340)={0x4cc, r2, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xec, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r4}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x10001, 0x9, 0x342a, 0x401}, {0x7f83763, 0x0, 0xbe9, 0x1}, {0xfaed, 0x358, 0x0, 0x61}, {0x4, 0x100000000, 0x5, 0x1}, {0x3, 0xffffffff80000000, 0x7fffffff, 0xf12}, {0x9, 0x6ca8a72e, 0x5, 0x3f}, {0x400, 0x7fffffff, 0x8, 0x8}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x78, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x100000000, 0x401, 0x3ff, 0x5}, {0x6, 0x3, 0x600000000000000, 0x1f}, {0x8, 0x3, 0xd4, 0x3}, {0xf87, 0x2, 0x0, 0x7}, {0x3, 0x8, 0x800, 0x1}, {0xffffe00000000000, 0x8000800, 0x2, 0x5}, {0x84b8, 0x0, 0x1, 0x8}, {0xfffffffffffffff9, 0x7ff, 0x8001, 0x800000000000000}]}}}]}}, {{0x8, 0x1, r7}, {0x140, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xdc46, 0x7fff, 0x0, 0x80}, {0x1, 0x5, 0xfffffffffffffffd, 0x401}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0xf0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r14}, {0xfc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r16}}}]}}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x40800}, 0x800) 00:19:03 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ffffffff000000000400000000000000faffffffffffffff010001000000000000000000000000000500000000000000000001000000000001000000000000000100000000000000400000000000000003000000000000000100000000000000ff000000b56b6e000201030200000000c600000000000000500008004900080000e14100bfa0b1abf53d9462a064a7290b87a9c6478b58f308b1e99d4d3948d0415a5cce1f7da72decb0feaa874e2ca5474c32961acce95e693e1c6a7df50255da22daadc900000010000a002abd700025bd7000d9800000d800020063626328646573335f656465290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007004000095eaac6214dfdfc5cd5500f0dd3d2019354c9e5bf0cba179f818a4f8ef6972e080fe5901f0838ff998d7f85e87f1d33a90853ff592bfebf5d0bdb7ab0cacdc317bab3afe31899766d6894c503b0e7d89bcc9e505f6f1d432db0cbff40fe117a3853693498a84b58ff7185b678360b77fff06f53c8204cfdf58c3e41e9f177036efe9bfb5795285bb832de1adadfb0000"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20040) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000000c0)={0x81, 0x6}) 00:19:03 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) init_module(&(0x7f0000000240)="6e6f6400000000b62fc4895a20b9af11f6b64b5defeb374d07e99415b541684a1c1ae98ccd6d79f8aadb2d0f1944bf30d1ed796e7d8321cc5a8b433849b07a7560412d011c5c612733f0c050435358852b0e4f8b6baca28c81531f18d61823ab9eee33c37060695f97e331beead4e9e4253b7071bf9bd619bf656a1f4b7fc76aa2b4cb0b9ab120a61e67b109e4511a8741815600000000000400ba328f74c05135dfade3b270d15035650d00000000000000", 0xfffffffffffffe60, &(0x7f0000000140)='\x00') prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)="da6faa40e684e7f29edab015958a1f1a77ce0ef0ed70e16e242ace627b9d7d44a329f5bb91d5e53d53be9992a2aa8eb0477eba47cc595cd3abee655dbfeec79927f042f9a07eb14c3ebb72ccaf4bda05459ba15eefb5a2c239a04ae02d8f909f8a3c528ba6b85ffefbf6147b"}, 0x10) r2 = syz_open_pts(r0, 0x2) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x4) ppoll(&(0x7f0000000300), 0x20000000000000aa, &(0x7f0000000340), &(0x7f0000000380), 0x8) dup3(r2, r0, 0x2000000000000) write(r3, &(0x7f0000000040)='H', 0x1) 00:19:03 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r5 = getpid() ptrace(0x10, r5) r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:03 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) init_module(&(0x7f0000000140)='security+!\x00', 0xb, &(0x7f00000001c0)='nodevlo\x00') r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="59b99e16160ce7c1af60c0e752b268905828729117e38c438d073ab4") ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) prctl$intptr(0x0, 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0xc0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0x1ff, {0x55f0, 0x4, 0x1, 0x0, 0xea1}}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) r3 = dup3(r1, r0, 0x0) write(r3, &(0x7f00000000c0)='H', 0xfffffffffffffec6) 00:19:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0xffffffffffffff32) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYRESDEC, @ANYRES16], 0x16) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:04 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ioprio_set$pid(0x2, r0, 0x6) keyctl$set_reqkey_keyring(0xe, 0x7) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:04 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) getpid() r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@rand_addr, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000600)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x40, &(0x7f00000016c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x19}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}, {@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}, {@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor'}}]}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0003d4ed93bfa3ee00"]) read$FUSE(r3, &(0x7f00000020c0), 0x1000) ioctl(r3, 0xf4, &(0x7f00000017c0)="9f0e60828b3a7b1a6d89ee8b36854033329fab999de4476ecb8db3b481f2d1144a375df2c7d21d429f7d7ef38cdc522cf6f262b70336513171fa1b74ebbb0d01ceff34180ccba98eb254be933c0f467a7885fe93364d8a65bea1dd2522791942f73c5f9e42f1bfdcae1ab7bd3588b5d1b8ddac1bab0f35b8a62ac94c498cd7d3782d13a218fe889b978c0528a3eb7812a5ab4ea587cdd0d1c6dcf50c58f76884f7bc86d48a88151bb910b86dd5070727f63f8670ae062cc75923d8cf8ec9eb551c48c7cad050a22abcf7da244aef26bc643e3aa700be3838fe0910f867041724f2a7fdb04d91246e30793b") write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000640)={0x2a, 0x3, 0x0, {0x5, 0x9, 0x0, 'mime_type'}}, 0x2a) read$FUSE(r3, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) truncate(&(0x7f0000000140)='./file0\x00', 0x1f) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x2}, 0x28, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000200)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:04 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40, 0x40) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ioctl$TIOCNOTTY(r2, 0x5422) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:04 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = memfd_create(&(0x7f0000000500)='\x00', 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd8, r2, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x4e1bdadfead7d04c}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf9e}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40000000000}]}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff7fffffff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x48810}, 0x20040085) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000180)={@ipv4={[], [], @dev}, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_deladdr={0x74, 0x15, 0x400, 0x70bd2b, 0x25dfdbfe, {0xa, 0x80, 0x302, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0xc}}, @IFA_FLAGS={0x8, 0x8, 0x76b78f0655d7cd95}, @IFA_ADDRESS={0x14, 0x1, @remote}, @IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x400}, @IFA_FLAGS={0x8, 0x8, 0x40}, @IFA_FLAGS={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x4880}, 0x4000080) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:04 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) getpid() r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:04 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20900) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)=0x5) 00:19:04 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) getpid() r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) 00:19:05 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x0, 0x4}) r1 = getgid() ptrace(0x10, r0) prlimit64(r0, 0x10, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000240)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) setfsgid(r1) 00:19:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d304f3030303030303030303e30303030303034303030302c757365725f69643db4cc4af95051b75c2ba67263c11d6cdee97d3b3ba11ad87c76507e9d33cab47808cfb92454088647ba3acacb1f32519590", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = getpgrp(0x0) write$FUSE_LK(r0, &(0x7f0000000200)={0x28, 0xffffffffffffffff, 0x2, {{0x58, 0x6, 0x2, r1}}}, 0x28) socket$key(0xf, 0x3, 0x2) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:05 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace(0x10, 0x0) r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="867f66643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0x2, 0x4, 0x8}}, 0x14) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) fcntl$setown(r0, 0x8, r2) 00:19:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x2) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x2, 0x2, 0x9}}, 0x30) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x8800, 0x130) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'yam0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="3d0000000000000000f9ffffffff070000dc0e0000060000000400000007000000000000c8d4075dd04fe3ab5640e81b18ccd9ab26875f8030db2a9351314ed3b421a800bd15f758983ec2e7435e0cddbceec7fd9b73be2f80d150c3625c46498bc887185c71082a4913996491cd89463caa659d"]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:05 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x20c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd2', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) dup(r1) read$FUSE(r1, &(0x7f00000020c0), 0x1000) readv(r1, &(0x7f0000000680)=[{&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000340)=""/124, 0x7c}, {&(0x7f0000000480)=""/249, 0xf9}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000580)=""/248, 0xf8}], 0x5) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000240)={0xffffffffffff79bb, 0xffffffffffffffff, 0xb800000000000, 0x5, 0x8}) 00:19:05 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace(0x10, 0x0) r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='^=\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ac00dd15987f55d9749abb5e2a2a207ad512f2208d58b4436dc6b1f74c018e7a9f6b70464d"]) read(r0, &(0x7f0000000140)=""/203, 0xcb) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'erspan0\x00', 0x8}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="3f00000000000000040000000000000002000000030000000300000000000000000000000000000003000000000000002000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000180000000000000080000000000000000000000000000000000000000000000002000000000800000000000000000000400000000000000ffffffff0000000001000100000000000000000000000000000000000000000000010000000000000000000000000000"]) r1 = dup2(r0, r0) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f0000000240)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/213, 0xd5}, {&(0x7f0000000600)=""/194, 0xc2}, {&(0x7f00000000c0)=""/8, 0x8}, {&(0x7f00000002c0)=""/17, 0x11}, {&(0x7f0000000340)=""/66, 0x42}, {&(0x7f0000000700)=""/173, 0xad}], 0x6, &(0x7f0000000840)=""/217, 0xd9, 0x7fff}, 0x3f}, {{&(0x7f0000000940)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000009c0)=""/231, 0xe7}], 0x1, &(0x7f0000000ac0)=""/2, 0x2, 0x53}, 0x5}], 0x2, 0x0, &(0x7f0000000b80)={0x77359400}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000bc0)=r2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000480)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x80000, 0x9, 0x4, 0x8000000000000}}, 0xa3bddfcd) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x4) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x16) 00:19:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x6) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) bind$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r2 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r2, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0xffffffff7fffffff, 0x7, 0x7, 0x4, 0x5}) write(r3, &(0x7f0000000040)='H', 0x1) 00:19:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:08 executing program 5: clone(0x200002102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ioprio_set$pid(0x3, r0, 0xfffffffffffffffc) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:08 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace(0x10, 0x0) r5 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000064c0)=[{{&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/114, 0x72}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/76, 0x4c}], 0x3, 0x0, 0x0, 0x4}, 0xe85e}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001800)=""/86, 0x56}, {&(0x7f0000001880)=""/91, 0x5b}, {&(0x7f0000001900)=""/162, 0xa2}], 0x3, &(0x7f0000001b40)=""/99, 0x63}, 0x2}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001a00)=""/59, 0x3b}, {&(0x7f0000001bc0)=""/6, 0x6}, {&(0x7f0000001c00)=""/219, 0xdb}, {&(0x7f00000040c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d40)=""/133, 0x85, 0x3ff}}, {{&(0x7f0000001e00)=@ll, 0x80, &(0x7f0000006400)=[{&(0x7f0000001e80)=""/135, 0x87}, {&(0x7f0000001f40)=""/111, 0x6f}, {&(0x7f0000001fc0)=""/197, 0xc5}, {&(0x7f00000050c0)=""/113, 0x71}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000006140)=""/116, 0x74}, {&(0x7f00000061c0)=""/141, 0x8d}, {&(0x7f0000006280)=""/156, 0x9c}, {&(0x7f0000006340)=""/172, 0xac}], 0x9, 0x0, 0x0, 0xffffffffffffffff}, 0x80}], 0x4, 0x10020, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80080, 0x5) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x841, 0x0) prctl$void(0x27) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x26) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de711e40570e52730b958a7e42534f117466f796d61da461d432d9386dbeb251ea4d9995e2b43c37af5d4ca467835477d795562a0f067f4c7ae746f6c2ee43ec4b0a15fa71c44af104370acd387328a4f2f420ff3f2bdceabc19bd38af35b79093aa33a7fd09486b861", @ANYRESDEC=0x0, @ANYBLOB="2c0091baabec978450be10a017574307d366be32854125be347f1691abc879144cff38ea1cc614fe6e332536075d539817a68855f458042d1b670b17aa3780538a"]) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x100000000}, 0xf) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) fcntl$setlease(r0, 0x400, 0x0) r2 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r2, r0, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) recvfrom(r3, &(0x7f00000003c0)=""/4096, 0x1000, 0x2140, &(0x7f00000000c0)=@rc={0x1f, {0x0, 0x9, 0x7f, 0x8, 0x5a7, 0x200000000000000}, 0x7ff}, 0x80) 00:19:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = accept$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) listen(r1, 0x9) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) [ 690.171397] SELinux: security_context_str_to_sid(staff_u) failed for (dev fuse, type fuse) errno=-22 00:19:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1d23"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000140)=0x9) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:08 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000240)={0x7, 0x70, 0x100000000, 0x8, 0x4, 0xc, 0x0, 0x3, 0x8, 0x1, 0xffffffffffff2b39, 0x68, 0x43e, 0x0, 0xfffffffffffeffff, 0x0, 0x7, 0x902, 0x9, 0x101, 0x80000001, 0x8, 0x411, 0x100000000, 0x5, 0x6323, 0x2, 0x4, 0x0, 0x6, 0x4, 0xc92, 0x5, 0x6f7, 0x80000000, 0x2, 0xc7, 0x6, 0x0, 0x1, 0x6, @perf_bp={&(0x7f00000001c0), 0x8}, 0x40, 0x7, 0x80000001, 0x5, 0x800, 0x9, 0x7}) [ 690.221843] SELinux: security_context_str_to_sid(staff_u) failed for (dev fuse, type fuse) errno=-22 00:19:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x7ff}}, 0x18) 00:19:08 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:08 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) r5 = getpid() ptrace(0x10, r5) r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) r2 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x134) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000500)=ANY=[@ANYBLOB="3a04040208283f00000000000000000000000000000000000000000000000000000000000000000192f605c66c7799cc33cceda0dd1f2df71f7c12cfbb5aff47da54347ff8e526ab5da8735a50e550926993f5e97de0a1539daaa3cc06a0714f050e65b0cb4be53c29417525a10653c68cc6f0134c44af4b8b3cd81aa1f8b5ee6160544106d7f196429179e8420e326eb265e68feae9dc281b89cfdb4533aa3a2bc83b0324725a95348615f68febff6b67b1ec04b7a74bd6b1eb431c29d965b0f2fae56a258d50bf67e33d9500000000000000"], 0x28) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000000c0)="9b5700") write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz1', "007ae7ed2f7d1fc4bcc34857bab099b2b2bdd516018b287ba742c80c9c6d26290323c8395b0b44d3f4cbcbca2c127da82a8b76ccf6259f3227b8cb15bc103dc8bec7395fc10e4f2a1f01a9a4445c6241d7b1063355ff42fb04d2aaf93035267bc41055db37f6099d17332c36ec84f28516054af3"}, 0x78) 00:19:08 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x42) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x15f7) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) mount(&(0x7f0000000140)=@sr0='/dev/sr0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fusectl\x00', 0x0, &(0x7f0000000200)='system.posix_acl_access\x00') getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) r3 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FICLONE(r1, 0x40049409, r3) ioctl$FICLONE(r1, 0x40049409, r2) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:08 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x804, 0x80000000) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140), 0x10) 00:19:09 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) r5 = getpid() ptrace(0x10, r5) r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x6, 0x0, 0x400, 0x1, 0x1, 0x9, 0x1, 0x9, 0x7ff, 0x0, 0x9d, 0x800}) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) ptrace$cont(0x20, r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x8, &(0x7f0000000240)=""/232) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) quotactl(0x7, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000340)="cfaf3bb37b9f89091672ae3b34ccce90e32cd5814a4639255e721931e0c3e7428d096cd3f1cb5799ea7ca226fd1b71d435e45dd1a2d87a309a109412f79518b56e18d1aa6e62b9ef1678a3c8a622c1a6b6c590ee75898236c5ae79fc4dac35c9b5b7307ac25599d2621fc93547e147cdfa389a697006a292484ddba902bfbeaadd722cadca60bd286e7be72094600bde2d9f58687e0e729de721a2a376f64a5a0f485e946a31a68829137205fb111b3b8d09b63136fd0d28bb0f1221149654df87a886") ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000140)={0x7, 0x5}) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:09 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) r4 = getuid() sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1028082}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="f80100001b00000825bd53729a5228a5e44f00000000000000000000000000bbe00000020000000000000000b171e54297f6000000004e2300d34e20332f0200", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x1f8}}, 0x880) r5 = getpid() ptrace(0x10, r5) r6 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffff9c) execveat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000001c0)='procbdev\x00', &(0x7f0000000240)=',\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='trustedkeyring\x00', &(0x7f0000000300)='cpusetcgroup)^[\x00', &(0x7f0000000340)="c700", &(0x7f0000000380)='{md5sum]bdevmime_type*\x00'], 0x100) socketpair(0x7, 0x0, 0x6, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:09 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x80800) getsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x3, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4, 0x0, 0x1}}, 0x50) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000340)={0x1, 0x70, 0xfffffffffffffff7, 0x2, 0x40, 0x101, 0x0, 0x2, 0x10000, 0x2, 0x1f, 0x5, 0x0, 0x100, 0x0, 0x300, 0x6a7, 0x9, 0x6, 0x4, 0x0, 0x180, 0x80000001, 0x2, 0x91, 0x4, 0x1, 0x100000000, 0xff, 0x800, 0x1, 0x0, 0x2, 0x80000000, 0x0, 0x3f, 0x16eb, 0xfffffffffffffffc, 0x0, 0x3, 0x2, @perf_config_ext={0x8, 0x8}, 0x4, 0x5, 0x9, 0x5, 0x0, 0xfffffffffffff449, 0x9}) 00:19:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x7}, 0x28, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000140)='em1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r0, 0x4) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000001740)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x24000) r3 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)="d411f28da5388406b1e4cadd5e10c4", 0xf, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000003c0)='em1\x00', 0xffffffffffffffff) r5 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)="5d7918fcedb0d0efdba8c9d110f885b3014b9f8632f79c80f9b4db2333c07a9ef84af6c4f1f13c3fa16822a8dc40daf274a9d09535586cfff3e93299ee2591e1e5b4b561716605a30b45ce87c184a740a7482287be868a3ac2606e156e5a556839776ba15a04075c24698723af8b08fed3fe2fbfd246b36db9e567dbebec006af9bf05958beb67b9bd41bf33d18d8ff0399a892959cb979e25eefd10ec3c34598d1bb6007a01970678e9de66638a0254e876f0c0d88d9a58b192dd9c2ca959230d619397eeaa0c04efce3cbca800e4e6c6d229aac4efc501b94d932b", 0xdc, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r4, r5}, &(0x7f00000005c0)=""/4096, 0x1000, &(0x7f00000016c0)={&(0x7f00000015c0)={'speck128-generic\x00'}, &(0x7f0000001600)="19c3e5cb1639c1d4806faf9eccee21fdaeb46e084e745b52b2675eac7de5533371c8aabe8417c443f5d7bae50c9e023ce53848adaeee06aea20d4a2f03ba6801d62c2135939b81929009f3dd504b364e666790e94c5c7822a2ab96bbee8136d18bf2fab7ed82b6a8c6b3a08c374f54e907a651e8c873e3cbe3c922cd72e9cfa3997375eafdf01ce672973c799685ef15729502930c67", 0x96}) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) ptrace$cont(0x20, r1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001700)='/dev/loop-control\x00', 0x0, 0x0) 00:19:09 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x14, &(0x7f0000000100)={0xfffffffffffffffd}) ptrace(0x421f, r0) sched_getparam(r0, &(0x7f00000001c0)) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000180)=""/15) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:09 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000580)=0x3b3) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x101000, 0x0) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4100404}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="c1050000", @ANYRES16=r4, @ANYBLOB="280429bd7000fbdbdf25040000000c000200080008000300000008000400000000802400010008000100020000000800080000100000080001000a0000000800020032000000080004007fffffff38000300140002007465616d5f736c6176655f300000000008000400ffff0000080001000000000008000500ac1414aa08000400000000000c00020008000600050000003400030014000600fe8000000000000000000000000000bb14000600ff02000000000000000000000000000108000800010000000800040002000000"], 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00003097365e87634f00", @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7a01184c880d00000000000035584da05e9385c2db6b542e420ec7cd52643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r5, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000240)='./file0\x00', r1}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x141200, 0x100) getpeername$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) 00:19:09 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) socketpair(0xb, 0x1, 0x5dd, &(0x7f0000000280)={0xffffffffffffffff}) write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000017820007002e2f66696c6530"], 0x10) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000280)) socketpair(0x0, 0x6, 0x200, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f00000001c0)={{r3, r4+10000000}}, &(0x7f0000000240)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:19:10 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000001880)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000001a00)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x440800, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000018c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000001900)=""/163, 0xa3) open(&(0x7f00000019c0)='./file0\x00', 0x8800, 0x80) execveat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000500)=[&(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000200)="1300", &(0x7f0000000240)='\x00', &(0x7f0000000340)='fd', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='user_id', &(0x7f0000000480)='/dev/fuse\x00', &(0x7f00000004c0)='group_id'], &(0x7f00000017c0)=[&(0x7f0000000600)='fuse\x00', &(0x7f0000000640)='group_id', &(0x7f00000016c0)='^&\x00', &(0x7f0000001700)='\\posix_acl_access|-^\x00', &(0x7f0000001740)=':\'systemem1', &(0x7f0000001780)='\x00'], 0x800) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001a80)={&(0x7f0000001800)='./file0\x00', r1}, 0xffffffffffffffd0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:10 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x105001, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000180)=0x1) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = dup3(r0, r0, 0x80300) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) ptrace(0x10, r2) ptrace$setregs(0x80000d, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:19:10 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x8000000002) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) ioctl$TIOCSBRK(r1, 0x5427) r2 = dup3(r1, r0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') write(r2, &(0x7f0000000140)='H', 0x1) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)) 00:19:10 executing program 5: clone(0x40000, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x10) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000180)=""/15) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:10 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) gettid() ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:10 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:10 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)=0x7) r2 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) ioctl$sock_ifreq(r2, 0x890b, &(0x7f0000000140)={"69666230020000000200", @ifru_map}) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000280)=""/38) syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x400) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f00000002c0)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:10 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x7, &(0x7f0000000340)="bfdeca4f2b7793639b0a599e3163b7fea9ff725a6ce97f8a00fc09d993e078d388b57f924c53b200d1c817e0cb3db16b05f143dcb2a9eb7a22d549a0776d1c2cb4195551e555e78117d211669cfbcb5da3aa303d9562baedccff2275416e9f4908632f271d0806e79009af9ef7d286f85bd8437d32a4b236e31df5d317932d5269e46e59658435bae7e835e1df910a5a391a104dbe8fc63cf33e17e2a2ae7e247f0000000045b8f03cfafb56e05595e1f245caa32862d3c99efc49ebe2d8c174f324b18dfa048b706c40f95b325815948b80827de453172dc7309bf7f6410ca1f4a36041d4a7f2000000000000000000000000000000") 00:19:10 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:11 executing program 5: clone(0x8800000, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x1) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000001c0)=0x100000001) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) ptrace$setopts(0x4200, r1, 0x6, 0x0) ioctl$TIOCCONS(r0, 0x541d) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\x00') r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20202c20}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000001800000028bd7000ffdbdf250220904dff04c80000080000080007007f00000108000b009300000045ea8c7296f3e6653c786a6145ec04b650f800ec297cf17965c461e060d64c9995b3aa17b3fa1ba1ec118eff539f0d80"], 0x2c}, 0x1, 0x0, 0x0, 0x20048000}, 0x8080) prctl$setmm(0x23, 0x7, &(0x7f0000470000/0x1000)=nil) prctl$setmm(0x23, 0x6, &(0x7f00001b5000/0x1000)=nil) write$eventfd(r0, &(0x7f00000002c0)=0x4, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f00006a6000/0x3000)=nil, 0x3000, 0x4) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000200)=0x4) ptrace$cont(0x20, r2, 0x0, 0x0) 00:19:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) getrandom(&(0x7f0000000140)=""/245, 0xf5, 0x2) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:11 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x8000) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) ioctl$VT_RELDISP(r0, 0x5605) write(r2, &(0x7f0000000080)='H', 0x1) 00:19:11 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x200, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000340)=0xc) write$binfmt_elf64(r1, &(0x7f00000030c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x80000001, 0x0, 0x3, 0x1, 0x3, 0x3f, 0x800, 0x1c2, 0x40, 0xce, 0x4, 0x394b7138, 0x38, 0x1, 0x1, 0x9, 0x6}, [{0x60000005, 0x6, 0x8, 0x5, 0xfffffffffffffff9, 0xffff, 0x1, 0x1}], "79a82ace8e6dab30b7b870d9408ffac8783e53e0347a3806068843d8048cf987f430d3f3250bb61f1e962dc70454357cf3e65b5da16174b5f9d6ba98cda9fe194117d1be264b105e4656d6d2854e6ec402c4139f38016149c918d9ce337547b3b56e0d00332aeaf03b3974eb04755c5d4b1ca3e8492a6d00d22bdf8b365e00a9efa5bbba1219c0ea4aee09b0b36df25be04276b794f316b74b495bf1079052686934a2d1f81c181ab0926208ba2543ab67fc3cc459ec559be4f18bce22fb3646086c8449c7c12d99b174431e240ded70", [[], [], [], [], [], [], [], [], [], []]}, 0xb48) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000016c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) setresuid(r3, r4, r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x480000, 0x0) linkat(r1, &(0x7f0000000180)='./file0\x00', r6, &(0x7f0000000200)='./file0\x00', 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000500)=r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4, 0x2) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66fb3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:11 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = socket$unix(0x1, 0x7, 0x0) write$binfmt_elf64(r0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x733) r1 = dup2(r0, r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000c40)=0x0) write$FUSE_LK(r1, &(0x7f0000000c80)={0x28, 0x0, 0x6, {{0x4, 0x0, 0x1, r2}}}, 0x28) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) r4 = dup2(r0, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000bc0)=[{0x0, 0x7ff}, {0x3, 0x2}, {0xc, 0x6}, {0x0, 0xf5b}, {0xe, 0x2}, {0xf, 0x7f}, {0x3, 0x7}, {0xb, 0x6}, {0xf, 0xcb}], 0x9) sched_getaffinity(r3, 0x8, &(0x7f00000001c0)) ptrace(0x10, r3) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x800, 0x0) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000000180)) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r3, 0x0, 0x0) r6 = dup3(r5, r0, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f0000000b00)={'broute\x00', 0x0, 0x4, 0xeb, [], 0x7, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000a00)=""/235}, &(0x7f0000000b80)=0x78) 00:19:11 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:11 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) rt_tgsigqueueinfo(r0, r0, 0x39, &(0x7f0000000140)={0x12, 0x25, 0x1, 0x1}) ptrace(0x10, r0) r1 = open(&(0x7f0000000180)='./file0\x00', 0xac040, 0x19) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @multicast2, 0x0, 0x4, [@multicast2, @empty, @rand_addr=0x4, @broadcast]}, 0x20) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000240)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:11 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "b472313d877252b4d19e3daaaeb9cc2551a36b2555d8bdfe7bbdd737d5e0a15d276e2193186f6eed17b62a8d89bc258451d606ff62fc7b9fb07144bd16cada8b2173744763e4ebc6945c405aae70f9eb628740c5ec6c045de9c01f30c237d47034ff851174b79392a21752c7b7fb984271a39850fd39670d6cb06b05223fe3810c40124698ced84f53"}, 0x99) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r1) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:12 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x22200, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:12 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) truncate(&(0x7f0000000080)='./file0\x00', 0x200) read$FUSE(r0, &(0x7f00000020c0), 0x96d) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x805, 0x0) renameat2(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x4) 00:19:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000:0000,user_id=\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:12 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000000005) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x12001, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:14 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000240)=0x14) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0xfffffffffffffffe, 0x6, 0xfffffffffffffff7, 0xfffffffffffff4bc, 0x0, 0x3, 0x44, 0x1, 0x65, 0x0, 0x5, 0x8, 0x9, 0x1, 0x9603, 0x7ff, 0x8, 0x7, 0xffffffff00000000, 0x3, 0x2000000000000000, 0xfffffffffffffff7, 0x40, 0xfffffffffffffffe, 0x9, 0x8, 0x6, 0x98, 0x4, 0x9, 0x0, 0xfffffffffffffe11, 0x0, 0xf4, 0x100400, 0xfffffffffffffff9, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000280)}, 0x8001, 0x8000, 0x4, 0x3, 0x4, 0x2, 0x20}, r0, 0xd, r2, 0x3) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000380)=0x2d2, 0x4) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6664dba61a0ba18b0d3f71174d9b81c8270a976102be1ed05d4a38971307f916e8565384cd876337853f725369508acc9807962bfa161f42ef7aeb69bc29593eed051a2a87ab019de5015e003a2f882cdbe7ebbc1568ac983a9f33e2e2c0e17459a6d1946583fb963ec0fae59c010e3a7640b5de410f08786836e3f07af843f6532afcdf3304666040d343a3a4914a67f01e69d78a583fe237c6ba26b24d75f061fad6ed978532c4e7b4a6a9652343e11839f14b86ae6b7522cedae3b1a0817ba77bd801c2bd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) 00:19:14 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:14 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0xcd) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/100) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r2, r1, 0x0) write(r3, &(0x7f0000000040)='H', 0x1) socket$unix(0x1, 0x1, 0x0) 00:19:14 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) pipe2(&(0x7f0000000180), 0x800) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030269ada17d12b0c563030303030303034303030302c757365725f69643d0b2cd081138f2838f1e1414e0bbb34628dbd7e0a454a033b4501be9bc1525ae2bf93380e3ce41cbd2d37b853389f48c67effcd8adb0af25d09a5de3251daf28f7f86716a911a3b7acaa6ed5332874ce25792577deb4a302c06fbcdcdc5a9f2d2b9f93cce88c4975d4a40187d12e2c90170506b112c11", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) getdents(r2, &(0x7f0000000140)=""/18, 0x12) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:14 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) r1 = memfd_create(&(0x7f0000000240)='keyringem1md5sum\x00', 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x8, 0x100000001, 0x2, 0x1, 0x0, 0xffffffffffffffff, 0x220, 0x1, 0x7, 0x3, 0x40e0, 0x8, 0x8, 0x4, 0x343, 0x74, 0x3, 0x7, 0x1000, 0x9, 0x0, 0x3, 0x8, 0x20, 0x0, 0x0, 0x6, 0xfffffffffffffffe, 0x6b, 0x437, 0x8, 0x3, 0xffffffffffffffff, 0xfffffffffffffff8, 0xf6e, 0xffffffff, 0x0, 0x8000, 0x1, @perf_config_ext={0xffff, 0xfffffffeffffffff}, 0x400, 0x3, 0x4000000000000, 0x6, 0x4, 0x8, 0x98c}, r0, 0x4, r1, 0x9) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:19:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x8000, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000180)=0x400) 00:19:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) getgroups(0x4, &(0x7f0000000240)=[0xee00, 0x0, 0x0, 0xee01]) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000440)=0x1, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) pwritev(r2, &(0x7f0000000680)=[{&(0x7f0000000500)="1e2ca38eec1bae31fa515704754dc436623cc712b569b54482515cb112f0355291ed0d3661a41b8e2a9d69673a4c8f0f8668cb8c1ba3c6ba0db6d9ecaa3d49d79094deed4c3784cbe0238ce5b628e659762edf593a40ec5d40842b3ccf3253ef7417f442b62e7f41934947000a9b338a3e5004f2ce62f05f14016a3ab211f68110d7d8c9475fa20bb1a162b4768cf1b67fbb8e6749a5684150c8d7d48df851936a7fb8d67acd3c84d8d7c9df83f3844307c8e3dd7545d666fd47c38ecd683b8e74f2a99fd09cbe93db08ea71", 0xcc}, {&(0x7f0000000600)="e2b0f5287b5910df609d45089714a475a9e5a14e11621b93a34582103bcb791e5a98c249f1b665487ef359c127cae28eb79071db94a45faaa755eac1a38c9583fcedcafccbf078ff21b81e9e13f235a8a938add8ff186b1e82d26a0aee4f9f4ae22cb1f957f97e1cea0327282e8ae1bc45f1c88da442782d3290f379cd", 0x7d}], 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000ac0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000200300004001000040010000400100000000000000000000500200005002000050020000500200005002000003000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe8000000000000000000000000000bbfe80000000000000000000000000000affffffffff000000000000ffffffffffffffffffffffffff9ca08b92ffffffff76657468310000000000000000000000766c616e300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000001600030240000000000000000000000000000000180140010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000004000000000000002800746f7300000000000000000000000000000000000000000000000000000007000000000000002800434c41535349465900000000000000000000000000000000000000000000feffffff00000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000ff0000ffffffffffffffff0000000000ffffffffffffffff65727370616e300000000000000000006e72300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007e00040201000000000000000000000000000000f000100100000000000000000000000000000000000000000000000028006d6800000000000000000000000000000000000000000000000000000000040301000000000020004e4f545241434b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000f99fca9e9d4eb3e5d3ceac6cfb15c7124eaaaa69b12fe026e18f32cdfa488b7082d536b3ee11157216f2"], 0x380) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x9}}, 0xfffffffffffffef2) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xc7, 0x2, 0x800, "a48c0ce60ac014cc5abb169657fe614c", "407b7bc5cf9cc550e92f412330f6dd88e528b584678c844ad9b04f4d07dcf2bc14179846aaca5d6acf489e356b63b3bd722212ed01cde3484a83145b0d5961326d5d50eed7907cf5546924e99cdd526203511a8c8735493b643329ea2b5bafefe6ca729f204bf6bae52afa5b3452f10de111acb9303d84bd293cc4a6ff989dd9ea7a98d4e3e6ac9cf42d1362da0787d201387ef3dd61212637d6eba38fb447d3593d1c2452f990f77c97a5494b507f23948c"}, 0xc7, 0x3) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) write$FUSE_POLL(r2, &(0x7f0000000a80)={0x18, 0x0, 0x5, {0x81}}, 0x18) 00:19:14 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) getpid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:14 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030309dbe30103030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:15 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000140)=""/156) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030301d303030303030303034303030302c757365725f69643d421385a0fee8b92f066fe9767d75d0ca42f1e96ea7749ab1b2513b1803abf5531bc61b324af35b3fcdd124c2ab2053cb109bb0c5cd073e253a436834c726017919f97ca3e1237b07d2390f17283f0bf5ea5fd0dc5c13d291d91c0ee8d6bf914e1a8db746ffc083e9af57cde35790ed35d0b41df6799fa4c9b349df5cb055ca874d3fd7a3fd6c55fe66df7979020e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) getgroups(0x8, &(0x7f0000000440)=[0x0, 0xee01, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0x0, 0xee01]) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x2000010, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}], [{@smackfsfloor={'smackfsfloor'}}]}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0xffc6, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4, 0x0, 0x80000000000000}}, 0x167) 00:19:15 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f836d6f64653d3030323030303030303030303030303030303430f7cdbc82757365725f69643da32b594041db8e1b5c1317d87735274c1b51e4e5e18ece173c7d64d0056d8ae5af5296dbd23de94bbdb9ba658be0764379452844eb31a6f131f21624edb508f8f9bb791219ef37d5d15e403705a42dd7a3aa81c0d1bfb0283ae13b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000440)=""/162, 0xa2) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x4080, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000340)={{0x0, 0x1, 0x20, 0x3, 0x86}, 0xfce, 0x60d, 'id0\x00', 'timer1\x00', 0x0, 0x40, 0x4, 0xc01, 0x7fff}) 00:19:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:17 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) tkill(r0, 0x24) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fallocate(r0, 0x18, 0x4, 0x4) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x80) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x147, 0x29, 0x2, {0x8, [{{0x4, 0x4}, 0x40, 0x2, 0x7, './file0'}, {{0x40, 0x2, 0x3}, 0x2, 0x80, 0x7, './file0'}, {{0x18, 0x2, 0x1}, 0x9, 0x7, 0x7, './file0'}, {{0x10, 0x4}, 0x6, 0x20, 0x7, './file0'}, {{0x26, 0x0, 0x3}, 0x0, 0x7, 0x7, './file0'}, {{0x40, 0x3, 0x4}, 0x7fff, 0x0, 0x7, './file0'}, {{0x48, 0x4}, 0xfff, 0x2, 0xd, './file0/file0'}, {{0x20, 0x1, 0x5}, 0x6, 0xffffffff00000000, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0x10000, 0x1, 0x7, './file0'}, {{0x30, 0x3, 0x3}, 0x4, 0xfffffffffffffff7, 0x7, './file0'}]}}, 0x147) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x2af6, 0x9, 0x8, 0x80000001, 0x315, 0xffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0xf96, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5}) fsync(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x1007c) read(r0, &(0x7f00000003c0)=""/4096, 0x1000) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r0, r0, 0x80000) write(r3, &(0x7f0000000040)='H', 0x1) 00:19:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:17 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="65cf3096022409da0000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x3f, 0x0, 0x6, 0x8000, 0x0, 0x80000000, 0x400, 0x1, 0x3, 0x9, 0x5, 0x80, 0x5, 0x4, 0x4, 0x33, 0x1f63, 0x100000000, 0x3, 0xffffffff, 0x1, 0x0, 0xfffffffeffffffff, 0x5, 0x0, 0x2, 0x7, 0x5, 0x33, 0x80000000, 0x4, 0x6, 0x10001, 0x0, 0x6, 0x4, @perf_config_ext={0x1}, 0x2084, 0x7, 0xfffffffffffffe01, 0x1, 0xfffffffffffffe00, 0x0, 0x7}, r1, 0x10, r2, 0x3) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r3 = dup(r0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000140)=""/114, &(0x7f00000001c0)=0x72) 00:19:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:17 executing program 5: clone(0x2000, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={0x3f, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @multicast1}, 0x80, 0x7fff, 0xff, 0x2, 0x7fffffff, &(0x7f00000001c0)='lo\x00', 0x4, 0x101, 0x8}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x0, [], [{0x80000000, 0x2, 0x6, 0x0, 0x1, 0x7f}, {0xffffffff, 0x4, 0x180000000, 0x0, 0x100, 0xb1}], [[], []]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) 00:19:17 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e20, @local}}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f0000000340)=""/134, 0x86, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r1, 0x10, &(0x7f0000000540)={&(0x7f0000000480)=""/184, 0xb8, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=0xffffffffffffffff, 0xfffffffffffffdb3) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000001c0)={0x0, r4, 0x6, 0xff, 0xbcb, 0x80}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:18 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:18 executing program 0: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x1, 0x64) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x20000000000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gr\a\x00\x00\x00id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000001c0)={0x41, 0x6, 0x0, {0x4, 0x5, 0x18, 0x0, 'system.posix_acl_access\x00'}}, 0x41) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file1\x00') getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x40) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000240)={0x101, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040)={0x6}, 0x0, &(0x7f0000000480)={0x0, 0x1c9c380}, 0xfffffffffffffdef) r0 = getpid() r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) read(r1, &(0x7f0000000040), 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') ptrace(0xffffffffffffffff, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r2 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000001c0)=0x80, 0x80800) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) getpriority(0x1, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000480), 0xffffffffffffffe5) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000180)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x315, 0x0, 0x2}, 0xffffffffffffff42) 00:19:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000000c0)) r2 = syz_open_pts(r0, 0x2) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000140)) ppoll(&(0x7f0000000300)=[{r2}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = dup3(r2, r0, 0x0) fcntl$addseals(r3, 0x409, 0x8) write(r3, &(0x7f0000000040)='H', 0x1) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030b030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) read(r0, &(0x7f00000030c0)=""/4096, 0x1000) fchdir(r0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000140)={'tunl0\x00', 0x2}) 00:19:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) write$selinux_context(r1, &(0x7f0000000180)='system_u:object_r:semanage_exec_t:s0\x00', 0x25) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000280)=0x1) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x2) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) r0 = open(&(0x7f0000000580)='./file0\x00', 0x400, 0x3) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000680)={0x4000000000000000}, 0x2a7) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f00000003c0)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000640)=ANY=[@ANYBLOB="5213f8f29b6f01b818d3a31a6c81bf28c4d3eb551a8bbe0d8d751aee61d6a150f6e9441f04528144b6a5"]) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmXde=00000000000000000040000,user_id<', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x9f3, 0x4, 0xffffffffffffffff}}, 0x50) r3 = add_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="cf97ed52ace35b258b5911c0adb926f1445589fd1a8931ad29b6f456c9b5694949274c33c25d67f4bb925efcb4c7f70abd50b365dbbab95094b6b3d609ddab881c6220ab9b9c9acb04c9c7c5c03d1a1424b6e6640c34bfbf7f4f7fbbe71411c9eec2c7e847f209a3f10b9b985348a4ae0097a6f4b01bedae440e90dc8232d1869e5c3f469cf4bb04abc6d4ea4ba1d32e4939ad89567c11e799ee7ab14aafe702e8a52326a01c08b835b4411e87c391453480efd35208132e0b81422c8cb0741ca5d56fa603ba7a7311eb1213a35550bb10833851158d85c65df05592b49153d3d0853e988f783ca0c5d4de136c62cd3e0ba440f5e8cefc", 0xf7, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) ioctl$FICLONE(r0, 0x40049409, r1) 00:19:18 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'md5sum*keyring^!selinux#$'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) write$FUSE_BMAP(r0, &(0x7f00000001c0)={0x18, 0x0, 0x7, {0x8001}}, 0x18) r1 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) timerfd_gettime(r2, &(0x7f0000000180)) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000240)) ptrace(0x10, r1) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000280)={0x0, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1, 0x2, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}]}, 0x190) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000040)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72766f746d6f64653d303030303030303030303030303030303030343acbf8a9d265c6345755288f49", @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000140)=r0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10800, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) renameat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0ca73be57b3700725803fbff00f7c2d48c2b1dcecb625ed3417a0c17f4264a784d7675547f3cf45106c071f9ad213cbdeb0b248a4f0fdc54c1de194658352b851063cd331b480a0f4aa8c7690ee5ce9d972a4fa05f230b374e43702898965023b8f94d346aea89894dca823124996a71e6722bbf8482026333d8eb76f0de23bbf2b813cadf522169f40bc8573aff4f9d03cca3417c133b5a4ca4ef6ece441dc9b99e91b2f8d79bee5e4fc243c8abb8ebcc2d21e9160755b7e2e4a6f67a6196b7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000020c0), 0x1000) read$FUSE(r2, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x40, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x1, 0xfff, 0x6, 0x888, 0x0, 0xfffffffffffffff8}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x3, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="abf96bcc000000000000", @ANYRESDEC=0x0, @ANYBLOB="00083216efbe772ef17113041ccd65715db220323c0c09b09f2c9e67bbf5bb9f108f5e2dff1d9e61d3ad009dd2967bc5308309b69450d3377d3def03f44ce7ae51f8b14447d1672cdc8118aea80f05b736552cf97d9b5b71fbebc8595e4d0fa6e4184b69745845f35b4dfb796f18f479614c5797278e7747d3ccf228c7c0d127d788ded47cbd5141fcbcdaf519ea66322d56a5"]) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x3) timerfd_create(0x2, 0x80800) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000140)='\x00', &(0x7f0000000180)='fuse\x00', 0xa0, &(0x7f00000016c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef'}}, {@seclabel='seclabel'}]}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x6, 0x4, &(0x7f0000000480)=[{&(0x7f00000017c0)="d791c4b67e1f1e7f0db20d963abde8abe47a6f223969eae47d673fbf9bb62aaa1fa4843a202fc6e5fe784e91b9a8fe89072a6645b3e7d206a06f315d107110254c88f7b3a6ab341aae3ddc725f3fecf359d2fd1b8b28feb625fe9e5f1de044a7fee9c2e97ed9a09811675309b6704ca9b144f933bdb1808a97e40624a93c7d1cecf3c9bef6190fd7d0eb76bc78cc47c4eb5793d4e732751737ea49f76c539b242d27175ed4f37ac95be7b7189ee5ec2ba83a36b320d0be089d1a76db2068db0541e7447fff0f4581ddbf22946540fd9f87249338108fe9a025824fec55b7a419ce169e94a5443b8ef26ed9a8d285", 0xee, 0x3}, {&(0x7f00000018c0)="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", 0xfc, 0x1}, {&(0x7f0000000380)="0bb0c01ba58e5f86e0b5d9f1d653c573", 0x10, 0x4}, {&(0x7f00000003c0)="8684d906f5572530a2d6a8cc41a5b6f09677f47f338fd3be4f865e3e2e4461213e22600f427f8e4ef5e10ea6139f46fc6255", 0x32, 0x80}], 0x10000, &(0x7f0000000600)={[{@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}}, {@rodir='rodir'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000019c0)='io.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001a00)={&(0x7f0000000500)='./file0\x00', r3}, 0x10) read$FUSE(r3, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:19 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) [ 701.845338] FAT-fs (loop0): bogus number of reserved sectors [ 701.854521] FAT-fs (loop0): Can't find a valid FAT filesystem 00:19:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ee55612a4ae7dc61b9514089da638eccebfd7ee2377726cfa274003f0f741e9f66ff94"]) read$FUSE(r0, &(0x7f00000020c0), 0x13ba) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000180)) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) mkdirat$cgroup(r1, &(0x7f0000000340)='syz1\x00', 0x1ff) fcntl$getownex(r0, 0x10, &(0x7f0000000380)) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) [ 701.943759] FAT-fs (loop0): bogus number of reserved sectors [ 701.949583] FAT-fs (loop0): Can't find a valid FAT filesystem 00:19:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x1, 0xa, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$KDDISABIO(r0, 0x4b37) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fuse\x00'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/fuse\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1000) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000180)={0x51, 0xac, 0x6, 0x10000, 0xfffffffffffffff7, 0x2}) 00:19:21 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) prlimit64(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x80800) fcntl$setown(r1, 0x8, r0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:19:21 executing program 0: r0 = openat$dir(0xffffffffffffff9c, 0xffffffffffffffff, 0x2000, 0x2) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x400000000000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) read$FUSE(r1, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x2, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x10000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67326f7511f14c563d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x802, 0x0) 00:19:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:21 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:21 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:21 executing program 4: r0 = memfd_create(&(0x7f0000000140)='/dev/fuse\x00', 0x5) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000200)={0x50, 0x80000000000, 0x1, {0x7, 0x1b, 0x0, 0x2000000000, 0x8, 0x4, 0x0, 0xfffffffffffffffd}}, 0x50) fstat(r0, &(0x7f0000000180)) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 00:19:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000180), 0x10) r1 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6465ffff303030303030303030de2294bca2bd303030303030ae4d638b2cd52b4b75736d725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) socketpair(0x5, 0x0, 0x6, &(0x7f00000001c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) 00:19:21 executing program 5: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = getgid() syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000500)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a00)="5fe739ec02ac24f39beefba1cc8f004807f095eb7d6a88d574cc264ea28fd92aa1ec6172320ca50e16191c63d90287bc8ff817f139eb09656f673d7524631675f44dbbb36544f4bbad2232ef4a2336", 0x4f, 0xffffffffffffffe1}], 0x100000, &(0x7f0000000b40)={[{@noquota='noquota'}, {@nodelalloc='nodelalloc'}, {@test_dummy_encryption='test_dummy_encryption'}, {@debug='debug'}, {@nodelalloc='nodelalloc'}, {@resgid={'resgid', 0x3d, r1}}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r2 = getpid() ptrace(0x10, r2) r3 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x180, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000180)={0x0, 0x5, 0x3}) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726ff400000064653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8f"]) fcntl$getown(r0, 0x9) getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000240)="617474722f66736372656174650e") mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x20) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000080)={0x5e, @remote, 0x4e23, 0x2, 'fo\x00', 0x0, 0x5, 0x25}, 0x2c) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x48001, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000240)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) setuid(r2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75045f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r1, &(0x7f0000000340)={0x70, 0xfffffffffffffff5, 0x5, [{0x1, 0x401, 0x1, 0x8, 'v'}, {0x4, 0x9, 0x8, 0x1, 'group_id'}, {0x0, 0x7f, 0x5, 0x6, 'fuse\x00'}]}, 0x70) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034301200302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75ff045f69643d9993da74d2b146182c780b13d9f5429ddae7a204d9338a0e08c41c236771a67316ef85b38a8d46231a928db32f875cfda7fa8194416fed716c4fa921", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000340), 0xffffffffffffff37) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@ipv4={[], [], @local}, 0x4e21, 0x2, 0x4e22, 0x5, 0xa, 0x20, 0x20, 0x33, r1, r2}, {0x8, 0x7, 0x1, 0x0, 0x4, 0x4, 0x200, 0x56}, {0x8000, 0x6, 0x8e, 0x9}, 0x91c4, 0x0, 0x2, 0x0, 0x1, 0x1}, {{@in6=@loopback, 0x4d5, 0xff}, 0x0, @in, 0x20, 0x7, 0x3, 0x400, 0xfff, 0x4, 0x20}}, 0xe8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r2 = dup3(r1, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) write$P9_RFSYNC(r1, &(0x7f00000000c0)={0x7, 0x33, 0x1}, 0x7) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000740)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r3 = dup(r0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000200)={0x7, 0x9bf}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r3, 0x1, &(0x7f0000000180)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000001c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:22 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getgid() read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ptrace(0x10, r1) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x180, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000180)={0x0, 0x5, 0x3}) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000001c0)=0xfff) quotactl(0x3e, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000480)="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") write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4, 0x0, 0x1}}, 0x50) 00:19:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303015303030303030303430302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000200)=0x6e) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0xffffffffffffffff}}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x80) 00:19:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x180, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000180)={0x0, 0x5, 0x3}) 00:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000240)='./file0\x00', 0x420200, 0x14c) ioctl$TIOCNXCL(r3, 0x540d) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x8400, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vboxnet1[md5sum{posix_acl_access'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'bdev\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, 'fuse\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, "4026273a9d"}}]}}) 00:19:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) get_robust_list(r1, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000200), 0x0, &(0x7f0000000340)={&(0x7f0000000240)}}, &(0x7f0000000480)=0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f00000004c0)={0x50, 0x0, 0x1, {0x7, 0x1b, 0xe5e6, 0x0, 0x6c1, 0x5ff5, 0x80000000}}, 0x50) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', &(0x7f0000000600)=""/162, 0x16b) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ppoll(&(0x7f0000000300)=[{}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x30, 0x5, 0x1, 0x1fc71750, 0x6, 0xff, 0x7, 0xffc00000}, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) write(r2, &(0x7f0000000040)='H', 0x1) 00:19:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fe=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) 00:19:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x180, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000180)={0x0, 0x5, 0x3}) 00:19:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="66643d444df682ac7be7477d7f5f8cfa7d75bd8f2f5514ac8c2c8a6aabc2675615dc06011ea954e27b7a33ad3224117f23901378604fe7a9a60d599829d2c3264ce00da5f4cf6346be79d33a768e1175519283b10082", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:23 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getgid() read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ptrace(0x10, r1) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$netlink(r2, 0x10e, 0x2, &(0x7f0000000180)=""/120, &(0x7f0000000200)=0x78) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r3}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x20080, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)=@random={'os2.', '\x00'}, &(0x7f0000000540)=""/162, 0xa2) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f0000000080)="c4e305489309c195d600dad243dd8f95a728d73e6746dbcc0f73d540f030630bc4a17d2b75fb8f0868ee74f738e7c4c260f3d3c4c1e11213") read$FUSE(r0, &(0x7f00000020c0), 0x1000) personality(0x140000c) open(&(0x7f00000000c0)='./file0\x00', 0x191200, 0xc) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x180, 0x0) 00:19:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000600)={0x50, 0xffffffffffffffff, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x7, 0xff, 0xffffffff, 0x200}}, 0x50) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x5, {0x4, 0x1, 0x9, 0x200000000000, 0x9, 0x1, {0x4, 0xd3d, 0x7, 0x6, 0x1, 0x8, 0xdac7, 0x7f, 0x2, 0x517caafa, 0x4, r1, r2, 0x6, 0x7f}}}, 0x90) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) fsetxattr$security_smack_entry(r0, &(0x7f00000016c0)='security.SMACK64IPOUT\x00', &(0x7f0000001700)='-bdev\x00', 0x6, 0x1) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x100000000, 0x8, 0x4}}, 0x50) 00:19:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xa8b2b7c14ad9cb57, 0x0) ppoll(&(0x7f0000000300)=[{r1}], 0x1, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380), 0x8) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) r4 = dup3(r1, r0, 0x0) write(r4, &(0x7f0000000040)='H', 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) 00:19:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = dup2(r0, r0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080), 0x4) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:24 executing program 1: clone(0x2102002002, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000400)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getgid() read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x400, 0xffffffffffffffff, 0x0, 0x7fffffff}}, 0x50) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getuid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) r1 = getpid() ptrace(0x10, r1) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x80800) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.upper\x00', &(0x7f0000000640)={0x0, 0xfb, 0x35, 0x7, 0x7, "a98d47466f889766e72480b7e2956e1b", "adc9a8ae90fc1897c8995ee222aa01fc3ccf0fa66b69538bb2add2af326b4169"}, 0x35, 0x3) 00:19:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="5bd870723afc33e9c9725f6971b5c1000000", @ANYRESHEX=r1, @ANYBLOB="2c706f6f746d6f225d16782a345bc31fbb4406884fb8f316257381b030303030303030303130303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0x0, 0x2, 0x7}}}, 0x18) read$FUSE(r1, &(0x7f00000020c0), 0x1000) r2 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x100000007051fd) getsockopt$inet_buf(r2, 0x0, 0x35, &(0x7f0000000100)=""/65, &(0x7f0000000180)=0x41) write$FUSE_INIT(r1, &(0x7f0000000480)={0xffffffffffffffeb, 0xfffffffffffffffc, 0x2, {0x7, 0x1b, 0x0, 0x80, 0x8, 0x11200000000004}}, 0xfffffffffffffeb0) socket$inet6(0xa, 0x80000, 0x1d7) 00:19:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x1e) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:19:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) 00:19:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpu.weight\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x2b9) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) 00:19:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = dup(r0) syz_mount_image$f2fs(&(0x7f00000003c0)='f2fs\x00', &(0x7f00000008c0)='./file0\x00', 0x100000001, 0x5, &(0x7f0000001b00)=[{&(0x7f0000000900)="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", 0x1000, 0x8}, {&(0x7f0000001900)="71085e9371bb32a361cf29677dec49aa7636cfeceea9f7b65afe3594fa456fd49577c09f59bb7d35c90ff3b1b9cc2eaed98c26fafc739b7a4b6439596128aa0a86635742e0579940c0c324a570cb7f941928a6df5db3b5e684693298a056d1c10b0d0e8d580db808cc6051c1554f1f", 0x6f, 0x1}, {&(0x7f00000030c0)="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", 0x1000, 0x200}, {&(0x7f0000001980)="aab36799b3cf5022bfa7823039fdf6abef531748055c7eba9f9361c7f20f8cbb243039cd668112aad2ce15f1798872a0542c39f3b5ee372b89e055ebc24d5edaa5d7fd91c661ea558fb25e625bfddff5dd1e75501dfcb7cf426f33e341c2b5db22ebcbe95210a4afe321", 0x6a, 0x9c}, {&(0x7f0000001a00)="8b2da1d74af55c9c3ea85fe6112919b1cdf0a8a6d023a28d7fc769337565464db1c61615e0cfa83419f4299de1a71c0dc665e1a4cdeba6efce6a485c0f8dfc864a5fab00f7b74307803344f050f98bfc8fba07e97e516f644af085a5c2712fd3d449d9ff5e0fdeb8c45aeb551a7b469805f96106e39809c437bf429fa7ed82ec5bcd42859349ef785da38734ba837e09661afaa48b5fa3b58c3aa1f8f1f4f242cd355ff92553b4079e42e2e79d7815fe3c24b173fceafe410a84dfefad110cc43ad092c04e74e14d267a3d0c33b890a7ad7152cbb5a84ef603479a6005c4a4f46924c9f5506499", 0xe7, 0x4}], 0x1000, &(0x7f0000001b80)={[{@extent_cache='extent_cache'}, {@noinline_dentry='noinline_dentry'}, {@disable_roll_forward='disable_roll_forward'}, {@inline_xattr='inline_xattr'}, {@inline_data='inline_data'}, {@prjjquota={'prjjquota', 0x3d, 'user'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/fuse\x00'}}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=@newspdinfo={0x43c, 0x24, 0x100, 0x70bd29, 0x25dfdbfb, 0x0, [@lastused={0xc, 0xf, 0x9}, @srcaddr={0x14}, @extra_flags={0x8, 0x18, 0x80000001}, @output_mark={0x8, 0x1d, 0x4}, @tmpl={0x204, 0x5, [{{@in6=@loopback, 0x4d6, 0x7e}, 0xa, @in=@remote, 0x3507, 0x0, 0x3, 0x100000001, 0x1f, 0x0, 0x3}, {{@in6=@mcast1, 0x4d3, 0x32}, 0xa, @in6=@loopback, 0x3507, 0x5, 0x3, 0xfffffffffffffff7, 0x2, 0xed, 0x1}, {{@in=@broadcast, 0x4d2, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x20}, 0x3500, 0x0, 0x3, 0xfffffffffffffffa, 0x6, 0x80000001, 0x15}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d3}, 0x2, @in6=@ipv4={[], [], @remote}, 0x0, 0x3, 0x1, 0x4000000000000000, 0x5, 0xd4, 0x401}, {{@in=@multicast1, 0x4d5, 0x3c}, 0x2, @in6=@dev={0xfe, 0x80, [], 0xe}, 0x3500, 0x3, 0x3, 0xb7, 0x1ff, 0xffff, 0x1}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d2}, 0x2, @in6=@remote, 0x3501, 0x2, 0x0, 0x10000, 0x0, 0x200, 0x200}, {{@in=@remote, 0x4d6, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x0, 0x3, 0x2, 0x2, 0x10000, 0x0, 0x9}, {{@in6=@local, 0x4d4, 0x3f}, 0xa, @in=@loopback, 0x3503, 0x4, 0x0, 0x9, 0xb9, 0x4, 0xffffffffffffff81}]}, @policy={0xac, 0x7, {{@in6, @in=@rand_addr=0x7, 0x4e20, 0x4, 0x4e22, 0xd39f, 0xa, 0x80, 0x20, 0x3f, r2, r3}, {0x7fff, 0x81, 0x3, 0x4, 0x6, 0x2, 0x0, 0x8}, {0x53c0, 0x9, 0x2, 0x6}, 0x100, 0x6e6bb2, 0x1, 0x1, 0x3, 0x2}}, @algo_comp={0xf8, 0x3, {{'lzs\x00'}, 0x578, "3c23799a04b52e7e1469e67436bd473a004f2ccc2af912214618c5f7804596cb2713d0c36672f27beac8ceb89dfbbb90f3bdaed75e64e731e878ffeeb05ea6d60473d812b3db57d678cfb80e9c886b531361233a5aece0186e58beb876794b87b73afa974ab3ab2ab57199575fcad2a20f3a4a2e863738d5afacc856fbc13041690736f7134068b290a808e2901c89f924542dcc0d70954e6d7a89e4c389456697e8306a816643896322fd5a77dce7"}}, @offload={0xc, 0x1c, {0x0, 0x1}}, @replay_esn_val={0x44, 0x17, {0xa, 0x70bd29, 0x70bd2b, 0x70bd25, 0x70bd27, 0x3, [0x8, 0xffff, 0x9, 0x0, 0x1f, 0x6152, 0x2, 0x8000, 0x2, 0x3ed8a9ca]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) 00:19:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x228100, 0x100) write$P9_RFLUSH(r1, &(0x7f0000000180)={0x7, 0x6d, 0x2}, 0x7) read$FUSE(r0, &(0x7f00000006c0), 0x126f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=@known='system.posix_acl_access\x00', &(0x7f0000000540)=""/162, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 00:19:24 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x200000, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fuse\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'group_id'}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) [ 707.075642] BUG: unable to handle kernel paging request at ffffed00553a0dff [ 707.083063] IP: [] fuse_dev_do_write+0x132a/0x2390 [ 707.089692] PGD 21fffb067 [ 707.092337] PUD 21fff9067 PMD 0 [ 707.095821] [ 707.097461] Oops: 0000 [#1] PREEMPT SMP KASAN [ 707.101929] Modules linked in: [ 707.105258] CPU: 1 PID: 5383 Comm: syz-executor0 Not tainted 4.9.128+ #42 [ 707.112160] task: ffff8801d983af80 task.stack: ffff8801a7ca0000 [ 707.118198] RIP: 0010:[] [] fuse_dev_do_write+0x132a/0x2390 [ 707.127269] RSP: 0018:ffff8801a7ca7910 EFLAGS: 00010a07 [ 707.132695] RAX: dffffc0000000000 RBX: ffff8801d7560000 RCX: ffff8801a9d07000 [ 707.139946] RDX: 1ffff100553a0dff RSI: ffff8802a9d06fff RDI: ffff8801d75600b0 [ 707.147209] RBP: ffff8801a7ca7ba0 R08: 0000000000000000 R09: 0000000000000001 [ 707.154463] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 707.161717] R13: ffff8801a7ca7bd0 R14: ffff8801cb0ad3c0 R15: 1ffff10034f94f2f [ 707.168973] FS: 00007f079d7e2700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 707.177194] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 707.183065] CR2: ffffed00553a0dff CR3: 00000001c6d5a000 CR4: 00000000001606b0 [ 707.190320] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 707.197575] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 707.204822] Stack: [ 707.206957] ffffffff00000000 ffff8801a7ca7bd0 ffff8801d7560000 ffff8801d75600b0 [ 707.214986] ffff880100000001 ffff880100001000 ffff8801d756009c ffff8801cb0ad3c8 [ 707.223015] ffff8801d75600a8 ffff8801d7560030 ffff8801cb0ad3d0 ffff8801b30ea200 [ 707.231042] Call Trace: [ 707.233617] [] ? end_requests+0x210/0x210 [ 707.239393] [] ? futex_wait_setup+0x330/0x330 [ 707.245530] [] ? futex_wake+0x1aa/0x450 [ 707.251133] [] ? futex_wait_restart+0x230/0x230 [ 707.257440] [] ? check_preemption_disabled+0x3b/0x170 [ 707.264264] [] ? retint_kernel+0x2d/0x2d [ 707.269951] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 707.276764] [] fuse_dev_write+0x142/0x1d0 [ 707.282572] [] ? fuse_dev_splice_write+0xc00/0xc00 [ 707.289150] [] ? iov_iter_init+0xaf/0x1d0 [ 707.294940] [] __vfs_write+0x3d7/0x580 [ 707.300453] [] ? __vfs_read+0x560/0x560 [ 707.306061] [] ? avc_policy_seqno+0x9/0x20 [ 707.311930] [] ? selinux_file_permission+0x82/0x470 [ 707.318594] [] ? rw_verify_area+0xe5/0x2a0 [ 707.324467] [] vfs_write+0x187/0x520 [ 707.329804] [] SyS_write+0xd9/0x1c0 [ 707.335064] [] ? SyS_read+0x1c0/0x1c0 [ 707.340491] [] ? do_syscall_64+0x48/0x550 [ 707.346264] [] ? SyS_read+0x1c0/0x1c0 [ 707.351699] [] do_syscall_64+0x19f/0x550 [ 707.357411] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 00:19:25 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xff}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x210000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000300)=[{r1, 0x1}], 0x1, &(0x7f0000000340)={r2, r3+10000000}, &(0x7f0000000280)={0xfffffffffffffffd}, 0x8) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xffffffff, 0x2, 0x4, 0x0, 0x0, 0x7, 0x605, 0xb, 0x2, 0xdb, 0x3ff, 0x5, 0x0, 0xc8, 0x80000000, 0x8d5, 0xadef, 0x9, 0x100, 0x401, 0x6, 0x1, 0x0, 0x3, 0x8, 0x4d, 0x15f, 0x4, 0xffffffff, 0x8, 0x8, 0x9, 0x7, 0x0, 0x1000, 0xfff, 0x0, 0x8, 0x4, @perf_config_ext={0x1000, 0x3}, 0x40, 0x7fff, 0x3ac5, 0x0, 0x4, 0x7ff, 0x37e}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x8) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) write$P9_RREMOVE(r5, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) r6 = dup3(r1, r0, 0x0) r7 = socket(0x10, 0x3, 0x0) sendfile(r0, r0, &(0x7f00000001c0)=0x80040000000, 0x0) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='%\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) write(r6, &(0x7f0000000040)='H', 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000180)=0x1) 00:19:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00108eed2bde5f179e3a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x49, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0xfffffffffffffd64) 00:19:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x8, 0x4}}, 0x50) [ 707.364327] Code: 02 84 c0 74 08 3c 03 0f 8e 56 10 00 00 8b 83 b0 00 00 00 83 e8 01 48 8d 34 01 48 b8 00 00 00 00 00 fc ff df 48 89 f2 48 c1 ea 03 <0f> b6 04 02 48 89 f2 83 e2 07 38 d0 7f 08 84 c0 0f 85 ca 0d 00 [ 707.392191] RIP [] fuse_dev_do_write+0x132a/0x2390 [ 707.398931] RSP [ 707.402554] CR2: ffffed00553a0dff [ 707.406017] ---[ end trace e089899e496fc9bf ]--- [ 707.410770] Kernel panic - not syncing: Fatal exception [ 707.416416] Kernel Offset: disabled [ 707.420031] Rebooting in 86400 seconds..