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"}, &(0x7f0000000000)=0x1024) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x466a) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 633.279594] input: syz1 as /devices/virtual/input/input3572 [ 633.291706] input: syz1 as /devices/virtual/input/input3573 [ 633.324026] input: syz1 as /devices/virtual/input/input3575 [ 633.333649] input: syz1 as /devices/virtual/input/input3574 [ 633.355520] input: syz1 as /devices/virtual/input/input3576 23:56:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x200000000000002, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x40000, 0x0) write$P9_RLERROR(r1, &(0x7f00000001c0)={0x9, 0x7, 0x2}, 0x9) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x45c) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x7, 0x7, 0x7}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x1991c0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000d40)={'syz0\x00', {0x7ff, 0x3, 0x3ff, 0xfffffffffffffffa}, 0x1d, [0x9, 0x3, 0x8, 0xfffffffffffffff8, 0x5, 0x9, 0x100, 0x6, 0xfffffffffffffff8, 0x3, 0xc459, 0x3, 0x5, 0xa0, 0x7, 0x0, 0xd4d, 0xff, 0x67a3, 0x2, 0xca, 0x3, 0xfff, 0x8, 0x0, 0x6f85, 0x7f, 0x6, 0x4, 0x6, 0x15ef9ce9, 0x7, 0x6, 0x7, 0x20, 0x8af, 0xb7, 0x6, 0x400, 0x9, 0x2, 0x0, 0x7, 0x4, 0x0, 0x5, 0x401, 0x45, 0xfffffffffffffffc, 0x4, 0x1, 0xffffffff80000001, 0x0, 0x9, 0xffffffff, 0x8001, 0x9, 0x5, 0x91, 0x3, 0x401, 0x7fff, 0x2, 0x7], [0x6, 0x6, 0x4, 0x1, 0x8, 0x7, 0x10000, 0xfffffffffffffffb, 0x0, 0x1, 0xffffffff, 0x40000000000, 0x9, 0x20000000000, 0x2, 0x80000001, 0x20, 0x20000000000, 0x50, 0x6, 0x9, 0x2, 0x62d, 0x6, 0xffffffff, 0x10001, 0x8001, 0x1, 0x2, 0xffffffffffffffe2, 0x2, 0x1, 0x7, 0x9, 0x401, 0x9, 0x4bf, 0xffffffffffffffff, 0x200, 0x9, 0x0, 0x1, 0x8, 0x10001, 0x4, 0x6, 0xe10d, 0x5, 0x3, 0x8001, 0x3, 0x5, 0x4, 0xa3, 0x7f, 0x8, 0x4, 0x5, 0x1, 0x7f, 0xf4, 0x100000001, 0x2, 0x1], [0xffffffffffffff75, 0x7f, 0x1, 0x6, 0xfffffffffffffffe, 0x8ff, 0x7, 0x401, 0x8001, 0xffffffffffffffd8, 0x0, 0x1, 0x800, 0x352c, 0x7, 0x2, 0xfffffffffffffffc, 0x6, 0x2, 0x9ac, 0xc89, 0xffff00000, 0x9, 0x7, 0x0, 0x9b65, 0x8, 0x5b4, 0x800, 0x5, 0x4df3, 0x9, 0xcfd, 0x3, 0x2, 0x4, 0x40, 0x1, 0x0, 0x6, 0x2, 0xab, 0x7f, 0xfffffffffffff000, 0xff, 0x2, 0x7, 0x4, 0x0, 0xf, 0xc8b, 0x2, 0xfffffffffffffff8, 0x6b64, 0x1a5, 0x1bff, 0x7, 0x3, 0xffffffff00000001, 0x8, 0xca, 0xb31, 0xf00, 0x5e], [0x7b, 0x2, 0x7fff, 0x9, 0x1, 0x33eb, 0x10001, 0x0, 0xf0, 0x4, 0x1ff, 0x3, 0x7f, 0x9, 0x3ff, 0xb8b0, 0x1, 0x1, 0xff, 0x80000001, 0xffffffffffffffe6, 0x9, 0x4, 0x1, 0x8001, 0x72, 0x101, 0x2, 0x3, 0x8, 0x0, 0x64, 0x2da, 0x76c5, 0x10001, 0x2, 0x2, 0x0, 0x5, 0xe28, 0x1, 0x8, 0x4, 0x401, 0x20, 0x8000, 0x9, 0xffffffff80000001, 0x5, 0x3, 0x7fff, 0x7fff, 0x7fff, 0x5, 0x4, 0x96b, 0x9, 0x9, 0x2, 0x6e, 0x0, 0x5f3c, 0x3f, 0x2]}, 0x45c) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 23:56:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000880)=0x3, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) [ 633.507764] input: syz1 as /devices/virtual/input/input3577 [ 633.547022] input: syz1 as /devices/virtual/input/input3578 23:56:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)=[0x4, 0xf31]) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$RTC_PIE_OFF(r1, 0x7006) dup3(r1, r0, 0x80000) [ 633.568650] input: syz1 as /devices/virtual/input/input3579 23:56:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)=@getsa={0x130, 0x12, 0x40a, 0x70bd29, 0x25dfdbff, {@in=@rand_addr=0x10000, 0x4d2, 0xa, 0x33}, [@tmpl={0xc4, 0x5, [{{@in6=@dev={0xfe, 0x80, [], 0x15}, 0x4d6, 0x3f}, 0xa, @in6=@ipv4={[], [], @rand_addr=0x5131}, 0x3504, 0x2, 0x0, 0x8, 0x7fffffff, 0x2, 0x3}, {{@in=@rand_addr=0x80000001, 0x4d3, 0x7f}, 0x2, @in=@local, 0x0, 0x3, 0x3, 0x100000001, 0x1, 0x8001, 0x1}, {{@in=@remote, 0x4d2}, 0x0, @in=@broadcast, 0x3505, 0x2, 0x0, 0x35d, 0x6, 0x4, 0x5}]}, @sec_ctx={0x44, 0x8, {0x3d, 0x8, 0x1, 0xfffffffffffffffd, 0x35, "85ac9d6f15c4aec52e2c703b3efd7c685de15ad4ea10a04814b33d649c224453f15f44ce01c6c92d514613485a00f288e0c32de94c"}}]}, 0x130}, 0x1, 0x0, 0x0, 0x4}, 0xc0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x3}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x3]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) getresuid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(r2, r3, r4) [ 633.635613] input: syz1 as /devices/virtual/input/input3580 [ 633.690806] input: syz1 as /devices/virtual/input/input3582 [ 633.694840] input: syz1 as /devices/virtual/input/input3583 [ 633.710131] input: syz1 as /devices/virtual/input/input3584 23:56:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) 23:56:30 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0xd, 0x89c, 0x7ff}) ioctl(r0, 0x5, &(0x7f0000000080)="2e0ba6e5d52952c7385d6b5949c859ed63cc09ac783ac0410cb304419dbe64ca78540d2144afb81c5e21") read(r0, &(0x7f0000004d00)=""/4096, 0x1000) 23:56:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) write$P9_RMKNOD(r1, &(0x7f0000000100)={0x14, 0x13, 0x2, {0x82, 0x3, 0x7}}, 0x14) 23:56:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0xfffffffffffffffe, 0x3, {{0x4, 0x7, 0x2, r2}}}, 0x28) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000500)={{0x2, 0x4e24}, {0x306, @dev={[], 0x1e}}, 0x58, {0x2, 0x4e20, @rand_addr=0x2}, 'syzkaller0\x00'}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r3, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="900000000000000000000000000000003371824c2b069efc23f6f1ddd6c701000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367736f757024636700159700000000000000000000000000"], 0x90) 23:56:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'exec ', 'group_id'}, 0xd) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000240)={0x17, 0xe, &(0x7f00000001c0)="15f9062d4f1113eb0c040804a43f"}) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsync(r1) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000340)=0x1000000000002) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000280)={0x3, 0x3}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000002c0)=""/114) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x7fffffff, 0x1}, {0xffffffff00000000}]}, 0x14, 0x2) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000240)=""/164, 0xa4, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0xfffffffffffffff8, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r4, &(0x7f0000001d00)=""/4096, 0x1000) [ 634.137085] input: syz1 as /devices/virtual/input/input3585 [ 634.148779] input: syz1 as /devices/virtual/input/input3586 [ 634.164259] input: syz1 as /devices/virtual/input/input3587 23:56:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400000, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000180)=""/51) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x404002, 0x80) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20200, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200, 0x0) r2 = openat(r1, &(0x7f0000000180)='./file1\x00', 0x24000, 0x104) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8a) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = getpgid(0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000000c0)) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x45c) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)={0xa1ac, 0x7}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 634.248920] input: syz1 as /devices/virtual/input/input3588 [ 634.277037] input: syz1 as /devices/virtual/input/input3590 23:56:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_cmd={0xa}}) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYRES16=r0], 0x2) [ 634.315712] input: syz1 as /devices/virtual/input/input3591 [ 634.330280] input: syz1 as /devices/virtual/input/input3592 23:56:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0xa0040, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002d00)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/238, 0xee, 0x200}, 0x40010020) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={r2, @broadcast}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = getpgrp(0x0) write$UHID_CREATE(r1, &(0x7f0000000dc0)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000d40)=""/74, 0x4a, 0x10000, 0x1, 0x3, 0x401, 0x100000000}, 0x120) rt_tgsigqueueinfo(r3, r4, 0x38, &(0x7f0000000080)={0x1a, 0x3ff, 0x5, 0x5}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r5 = socket$packet(0x11, 0x40000000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x10000000000006, 0x0, 0x0, 0xe362}]}, 0x10) r6 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = creat(&(0x7f0000000140)='./file0\x00', 0x0) accept$unix(r7, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000880)=0x14) socket$inet6(0xa, 0x800, 0x5) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) socket$inet6(0xa, 0x5, 0x5) sendto$inet6(r6, &(0x7f0000e77fff), 0xfffffffffffffe64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 634.407368] input: syz1 as /devices/virtual/input/input3593 [ 634.426705] input: syz1 as /devices/virtual/input/input3594 23:56:31 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d40)={'syz1\x00', {0x768, 0xff, 0x7f, 0x2}, 0x50, [0x48, 0x8, 0x0, 0x100000001, 0xf5b, 0x200, 0x1, 0x10001, 0x0, 0x63ee, 0xffffffff, 0xbee, 0x5933, 0x7, 0x1, 0xcf76, 0x10001, 0x7fffffff, 0x1000, 0x4, 0x0, 0x3, 0x6, 0x1f, 0x4af2, 0xa3, 0xffffffff, 0x3, 0x1c8, 0x6, 0x80, 0x0, 0x401, 0x20, 0x9, 0x0, 0x7fffffff, 0x100, 0x3, 0x40, 0x5, 0x2, 0xb8a1, 0xb07, 0x2, 0x2, 0x83f, 0x1, 0x30c, 0x3, 0x200, 0x7fff, 0x9, 0x9, 0x9, 0x4, 0x80000000, 0x8001, 0x1, 0x9, 0x5, 0x1f, 0x8, 0x8], [0x7, 0x400, 0x4, 0x0, 0x80000000, 0x4, 0xf05a, 0x3f, 0xb19b, 0x5, 0x0, 0x3, 0x5, 0xb93, 0x4a, 0x46, 0x9b, 0xf86, 0x4, 0x63e0, 0x1ff, 0x6, 0xfffffffffffffffa, 0xfffffffffffffffe, 0x7, 0x6, 0x1c00000000000000, 0x100, 0x7, 0x7fffffff, 0x2000000000, 0x10001, 0x4, 0x98e8, 0x7, 0x10001, 0x5, 0x5, 0x7, 0x9, 0x9, 0x1000, 0xfffffffffffffff7, 0x0, 0x1, 0x7ff, 0xb805, 0x1, 0x91, 0x100000000, 0x9, 0x10000, 0x8001, 0x3, 0x5e, 0x100000001, 0x29f, 0x0, 0x6, 0x0, 0x1, 0x81, 0x1, 0x5], [0x0, 0x5, 0xd69, 0x3, 0x7, 0x7ff, 0x3, 0xd7c, 0x1, 0x5, 0x100000000, 0x2, 0xce0, 0x10000, 0x4, 0x5, 0x9, 0x84c, 0x6, 0x80000001, 0xfffffffffffffffc, 0x7, 0x2, 0x1, 0x8, 0x3, 0xd5, 0x10001, 0xaadf, 0x3, 0x2, 0xcb, 0xff, 0x0, 0x5, 0xfffffffffffffffe, 0x9, 0x0, 0x1, 0x1, 0x3f, 0xffffffffffffffa0, 0x9, 0x100000000, 0x9, 0x5651, 0x2, 0x1, 0x2, 0x5, 0x5, 0x0, 0x200, 0x4, 0x1, 0x5, 0xfffffffffffff800, 0x8001, 0x8000, 0xfffffffffffffff9, 0xfffffffffffffffb, 0xa1d9, 0x0, 0x2], [0x2, 0x75, 0x9, 0x8000, 0xff, 0x9, 0x5, 0x9, 0x4, 0x0, 0x2, 0x6, 0x100, 0x7f, 0xd7e000000000000, 0xfffffffffffffffa, 0x32, 0x2, 0x1000, 0xe000000, 0x40, 0x1, 0x1f, 0x1, 0x5, 0x10000000000, 0xdfb9, 0x3, 0x0, 0x4, 0x1, 0xfffffffffffffffe, 0x3, 0x9, 0x1, 0x7, 0x4a84, 0x3f3b, 0xfffffffffffffffb, 0x5, 0x401, 0x8, 0x7, 0xeb7, 0x2, 0x246c000000000000, 0x9, 0x0, 0x9, 0x2, 0x0, 0x7ff, 0xfda6, 0x8, 0x100000001, 0x6, 0x8001, 0x9, 0x7, 0x6, 0xd71a, 0x80000000, 0x3, 0xac38]}, 0x45c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1f) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x210000, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="661f2f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = getuid() getresgid(&(0x7f0000000180), &(0x7f00000002c0), &(0x7f0000000300)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x4800, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6f33}}, {@max_read={'max_read', 0x3d, 0x77603cbf}}, {@allow_other='allow_other'}], [{@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'lo'}}]}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 634.965025] input: syz1 as /devices/virtual/input/input3599 [ 634.980161] input: syz1 as /devices/virtual/input/input3600 23:56:31 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000240)=""/164, 0xa4, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000040)=0x80) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000000c0)={@broadcast, @remote, @remote}, &(0x7f0000000180)=0xc) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$int_out(r0, 0x0, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 635.127041] input: syz1 as /devices/virtual/input/input3601 [ 635.148900] input: syz1 as /devices/virtual/input/input3602 [ 635.170759] input: syz1 as /devices/virtual/input/input3603 23:56:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b237800000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc637075738100000000000000246367000000000000009a0000000000000000"], 0x90) 23:56:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) [ 635.221477] input: syz1 as /devices/virtual/input/input3604 23:56:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 635.276285] input: syz1 as /devices/virtual/input/input3605 [ 635.315560] input: syz1 as /devices/virtual/input/input3606 23:56:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'veth0_to_team\x00'}) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x7, {0x100, 0x0, 0x100000000, 0x800}}, 0x20) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x600, 0x0) pipe2(&(0x7f0000000140), 0x80000) 23:56:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) socketpair(0x5, 0x5, 0xfffffffffffffffa, &(0x7f0000000000)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@v2={0x3, 0x1, 0x11, 0x7fff, 0x24, "612e3a35c3d86f3564ba43b3719a790d06585093768da5bec4cf8a43994dabf724f4516d"}, 0x2e, 0x3) [ 635.479116] input: syz1 as /devices/virtual/input/input3607 [ 635.504863] input: syz1 as /devices/virtual/input/input3608 [ 635.517382] input: syz1 as /devices/virtual/input/input3609 [ 635.529289] input: syz1 as /devices/virtual/input/input3610 23:56:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0xfffffffffffffc00, 0x1, 0x7, 0x7fff, 0x100000000, 0xff, 0x9, 0x62, 0x3, 0xffffffffffffffff, 0xf1, 0x1}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x90) 23:56:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3a, &(0x7f0000000080)=""/109, &(0x7f0000000100)=0x6d) [ 635.825080] input: syz1 as /devices/virtual/input/input3611 [ 635.843247] input: syz1 as /devices/virtual/input/input3612 23:56:32 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000240)=""/164, 0xa4, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) socket$inet6(0xa, 0x2, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x27184ca5954f1fe2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000640)=0x13, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000340)='.\x00', &(0x7f00000005c0)) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x3}}, 0x18) read$FUSE(r0, &(0x7f0000001000), 0x1000) clock_settime(0x5, &(0x7f0000000040)={0x0, 0x1c9c380}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) fcntl$setflags(r0, 0x2, 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x111000, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0xbe, "df223f22df6fc750c08270b77ff318e1009cb407cf1dcd071ab36abf4aca2a20f62d9d2b52fec460e1225b271b31fbf10231cc1594d09a939e790e67d6cb00bf2bb0bf0057bfc3d53af7a83095dd3780f7ea377142d672c79fcd8b050b2def0ea83c983bdbca1c9a6ff4ec42d2eb4cc422cd45d3ef4526c99bc9bd3b1ae3546d7444c1950836dbdcbd6361f827bfbf5af5f1a99269472aa473cdfaa2d41913a5a6e49b1fac1e4d299429a715b47cff332e9432fec53f1f9770b24b8cda33"}, &(0x7f00000001c0)=0xe2) 23:56:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 23:56:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0xfffffffffffffffc}, 'syz1\x00', 0x2}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[{0x8, 0x6}], 0x1) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="d5ad43a68b59f475aa77ceae0ae49f985e149fcf47026aa452b392fb214d9e55dedd33868b5fc484a2499d7de0c348c5a1fcf8d053c599ce5abb8d50316785c32c13a257", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = dup(r0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, r1, 0x0, 0xa, &(0x7f0000000680)='/dev/fuse\x00', 0xffffffffffffffff}, 0x30) r3 = getpgrp(r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r3, r4, r5}, 0xc) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 635.956188] input: syz1 as /devices/virtual/input/input3613 [ 635.977104] input: syz1 as /devices/virtual/input/input3615 [ 635.988448] input: syz1 as /devices/virtual/input/input3614 23:56:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$VT_WAITACTIVE(r1, 0x5607) [ 636.054437] input: syz1 as /devices/virtual/input/input3616 [ 636.093854] input: syz1 as /devices/virtual/input/input3618 23:56:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b237800000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc637075738100000000000000246367000000000000009a0000000000000000"], 0x90) [ 636.126321] input: syz1 as /devices/virtual/input/input3619 23:56:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:33 executing program 5: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) dup(0xffffffffffffff9c) openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000cb5474f9c573082ca8cd085c9d26c7d9849f8c2e41b2c52801591b0a9a41c6255e816a8d4fa1182fae704e82bd1b326a1200000000"], 0x4, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x90) 23:56:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x9b3) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 636.699700] input: syz1 as /devices/virtual/input/input3620 [ 636.713900] input: syz1 as /devices/virtual/input/input3621 23:56:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000240)=""/164, 0xa4, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) mkdirat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x100) read$FUSE(r0, &(0x7f0000001000), 0x1000) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:33 executing program 2: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb2901017bc2a56e7534d77d0503b9ca9cf31bc264882b5f0c2f14449e458d0b43b1c1458ead0064307755a2f0e1496941eba9c3ca4875bde212fd94166786fc6288ac58206ab8b3c29e55a522909a64032e230dde0d175707e08363e98b3443fe4395c1c1e6e17ede10f62e8f08da585b7bf9e404e946276c2552356a6697c3d245845ce6ea5e105478e043ca71200399437123e0be7fbafdc4031cfc6d0ef168779ff057d5d745904a91f3fb3516c939bccbc55dafa8a2190aa1"], 0x29, 0x2) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f230a76ce8c946100000000002b7379737465746a48be1b31486dcc6370757365746367726f75702463670000000000000000000000000000000000000000000000000000"], 0x90) [ 636.891947] input: syz1 as /devices/virtual/input/input3622 23:56:33 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000240)=""/164, 0xa4, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0xfffffffffffffff8, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r4, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r4, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r4, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r4, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xe6f, 0x200200) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) [ 636.935017] input: syz1 as /devices/virtual/input/input3624 23:56:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB='-rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_GETXATTR(r0, &(0x7f00000000c0)={0x18, 0xfffffffffffffffe, 0x4, {0x101}}, 0x18) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r1], 0xfffffffffffffe41) 23:56:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x109201, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x17, "6883fdc1aa34e80097986097198ff5b706882655356737"}, &(0x7f0000000180)=0x3b) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 636.998852] input: syz1 as /devices/virtual/input/input3625 [ 637.025279] input: syz1 as /devices/virtual/input/input3626 [ 637.079759] input: syz1 as /devices/virtual/input/input3627 23:56:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)={0x2, 0x200}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000100000000f4ffffff00008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b746a48be1b31486dcc6370758865746367726f755e24636700000000000031000000000000000000"], 0x90) 23:56:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x9) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000080)='syz1\x00') read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000300)=0x1c) getpeername(r1, &(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000340)=0x80) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0xffffffffffffffff, 0x1, {0x7, 0x1b, 0xb46, 0x80400, 0xb61d, 0x1, 0x1, 0x1}}, 0x50) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+10000}, {0x0, 0x2710}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 637.547770] input: syz1 as /devices/virtual/input/input3628 [ 637.575744] input: syz1 as /devices/virtual/input/input3629 23:56:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000180)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:34 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200025bd7000fcdbdf2503000000080001004e210000080002000a000000080003006c000000080001004e2200000800040000000000080002000a000000080001004e230000080004000200be000800040001000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000080)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$int_in(r0, 0x5473, &(0x7f0000000280)=0x40) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x14) [ 637.754778] input: syz1 as /devices/virtual/input/input3630 23:56:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x80, 0x80) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) [ 637.798126] input: syz1 as /devices/virtual/input/input3631 23:56:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getpeername$inet6(r1, &(0x7f0000001280)={0xa, 0x0, 0x0, @remote}, &(0x7f00000012c0)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) r5 = getegid() getgroups(0xa, &(0x7f00000003c0)=[0x0, 0xee00, 0xee01, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0xee01]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000011c0)=0xc) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000001300)=ANY=[@ANYBLOB="02000000010002000000000002000300", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="1c9aaf4202000554", @ANYRES32=r4, @ANYBLOB="040006000000000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="10000300000000002000040000000000"], 0x54, 0x3) write$uinput_user_dev(r0, &(0x7f0000000d40)={'syz1\x00', {0x7, 0x5, 0x20, 0xd573}, 0x3c, [0x4, 0x10001, 0x5, 0x7, 0xb35, 0x2, 0x2, 0xa4, 0xffffffffffffffff, 0x4, 0x0, 0x4, 0xfffffffffffffff8, 0x8, 0x5, 0x6, 0x5, 0x80000000, 0x7ff, 0x1, 0x3, 0xd18f, 0x0, 0x7, 0x7, 0xfffffffffffffff8, 0xfffffffffffff801, 0x7, 0x80, 0x974, 0xfffffffffffffffa, 0x9, 0x8d5b, 0x1fe000000, 0x4000000, 0x6, 0x6, 0x10000, 0x2, 0x1f, 0x7, 0x3ff, 0x2, 0x8, 0x3, 0x1, 0x716, 0x8, 0x9, 0x2, 0x1, 0x4, 0x3ff, 0x2, 0x6, 0x6, 0x60, 0x1, 0x3, 0x5, 0x7, 0x7fffffff, 0x3f, 0xb3], [0x2e3, 0x4, 0x3, 0x7ff, 0x80000001, 0x3, 0x3f, 0x5, 0x8000, 0x401, 0x1a80, 0x8001, 0x100000000, 0x8, 0x3, 0x1, 0x20, 0xffffffff, 0xffffffff, 0x1, 0x5, 0x1, 0x7, 0xb47, 0x40, 0x8, 0xacb, 0x2, 0x8, 0x0, 0x6, 0x3, 0x9, 0xffffffffffffffff, 0xff, 0x6, 0x6, 0x0, 0x1, 0x7, 0x6, 0xfff, 0xffffffffffffff00, 0xc882, 0x1, 0xfffffffffffffffe, 0x100000000, 0xcae, 0x8001, 0x4b6, 0xffffffffffff32fb, 0x4, 0x0, 0x6, 0xfffffffffffeffff, 0x9, 0x200, 0x6068, 0x4, 0x8859, 0x9, 0x8, 0x1f], [0x1f, 0x7, 0x8000, 0x0, 0x100, 0x5, 0xe235, 0x81, 0x1ff, 0x6, 0x2, 0x20, 0x3c, 0x1, 0x7, 0xaed, 0xfffffffffffeffff, 0xffff, 0x7, 0x7, 0x8, 0x1000, 0x5, 0x8, 0x32a436c4, 0x2, 0x0, 0xcd2, 0xffffffffffffffff, 0x2, 0x3f, 0x5, 0x7, 0x816f, 0x5, 0x401, 0x3ff, 0x3, 0x81, 0x3, 0x2, 0xffff, 0x26b8, 0x8, 0xf81, 0x5, 0x5, 0x1ff, 0x82, 0x7f, 0xfe4, 0x0, 0x2, 0x8, 0x1, 0xb19, 0x4, 0x81, 0x8001, 0x1, 0x200, 0x0, 0x9, 0x85], [0x8, 0xfff, 0xd31, 0x5, 0x7, 0x8, 0x3, 0x2, 0x1c00, 0x3f, 0x8, 0xde8, 0xfffffffeffffffff, 0xc5, 0x1f, 0x401, 0x6, 0x80000000, 0x4, 0x2, 0x0, 0x6, 0x20, 0x0, 0xa1c9, 0x404000000000, 0x2, 0xfffffffffffffc00, 0x81, 0x362, 0x400, 0x26, 0x7, 0xfffffffffffffffb, 0x388, 0x40, 0x5, 0x9, 0x1, 0xfc, 0x0, 0x401, 0x7, 0x1, 0x1, 0x3, 0x6, 0x7fff, 0x7, 0x8, 0x2, 0xfffffffffffffffd, 0xe11, 0x3, 0x1, 0x10001, 0x7, 0x8, 0x4, 0xffffffff, 0xfffffffffffffffd, 0xffffffffffffffba, 0x401, 0x5]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$binfmt_script(r1, &(0x7f00000005c0)={'#! ', './file0/file0', [{0x20, 'em1}'}, {0x20, '{'}, {0x20, 'IPVS\x00'}, {0x20, 'user_id'}, {}, {0x20, '/dev/fuse\x00'}, {0x20, '&!keyring/'}, {0x20, ')vboxnet1'}, {0x20, 'group_id'}, {0x20, 'user_id'}], 0xa, "a9076a988a0cfd98dd31"}, 0x62) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:34 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 637.880425] input: syz1 as /devices/virtual/input/input3633 [ 637.919403] input: syz1 as /devices/virtual/input/input3634 23:56:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x80, 0x80) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) [ 637.968671] input: syz1 as /devices/virtual/input/input3635 23:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) fcntl$notify(r0, 0x402, 0x80000001) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x100, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e20}, {0x307, @local}, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 'bridge_slave_1\x00'}) fchdir(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="66647f", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6655e68bef8622e30bb4ba2e03b91964dd765c"]) read$FUSE(r1, &(0x7f0000002000), 0x1000) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000000c0)=0x6) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10}, 0x10) flistxattr(r0, &(0x7f00000002c0)=""/88, 0x58) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030300330303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x26, 0x3, 0x0, {0x6, 0x5, 0x0, '+self'}}, 0x26) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 638.429757] input: syz1 as /devices/virtual/input/input3637 [ 638.447405] input: syz1 as /devices/virtual/input/input3636 23:56:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$setflags(r0, 0x2, 0x1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000001c0)) syz_read_part_table(0x8, 0x5, &(0x7f0000000380)=[{&(0x7f0000000d40)="e067c6719096a47501f3c3b19b25708f9f99a51ca27f1850dd011d09fef74f8376d4788aa254b957b39573d814e7e5857a90cc7d8807fc79de976373d11aec1a6b4d06d9afe51a1037109e4c5eee323f7125fbe84261ad6c08ad1342cb1b3874ca1b4771f42e364db8b2cdae9160560d031f0699e846bd47fe354b8131ed87d24e73e0af4734c48fc872ddfd8ecc73b657051dae35d89aa7c46b4c1a884d014f07b421b204247cc89100e754e72d52c9a9b0ea0b7bbec95571ec6a7f01e9f9aed0a2a48dba211828afd770303530ea6cddfe8c06619205f135398a9aebd2933f51513c1f6ab718c5e731f159b69e", 0xee, 0x8}, {&(0x7f0000000280)="147c8d030fe7d0d1127028314e1ebb685a43b87cdb2a4129d813b1508f0241135d6ca50c8f3b6d224f60e33c53c04c7b7e4641ede23ec3ca", 0x38, 0x1}, {&(0x7f0000000e40)="37a7f99df8635948dea162a55af308829fb4ccaebfc59c6779cd90f71c2295c1e349aea29cf1d3af13aa12c03f0b281ce50ef0a5470bc8f403b50687886b61ae301812eaadd46fbdf7f5caeb3abef5b1204d2d2c06fefdf21ee3831c18a364a54aa5eaefd973e366f57010c788eddea3510002c5d696d09bfa17d459ceeee7c3122089dd39e886a6562583cf2ee7cff3401352500dca11b0ea88e1949ac6a2f76a4e94", 0xa3, 0x40}, {&(0x7f0000000f00)="dbee1eefe37b4cbcff31062aa544ea2028dd1ddf4ceacc3e02a185701986f49759f641f4a4f1b4981ec291f0e82e7d9ed015d17ed8ff6901f486d388123c2a9cb4c8301ace3880f22ba22063c47af59e05058071e2a03058c852399c13aed66c6eae2670b56c69bba0f1dc53083a14942e232b8815167e095550fb953124bc715ee294265787bfb09560a36ed4833ab25ae427cb9bfd5ecda76514c7eb52397d5c00f50302e970c57f20ad83a5dd7a447c073b7eb81cc70cc36972ce0c0bfdee691f7c148a64b521ff77c04255", 0xcd}, {&(0x7f0000001000)="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", 0xff, 0x80000001}]) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x3f, &(0x7f00000000c0)=""/120, &(0x7f0000000140)=0x78) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r3 = socket(0xa, 0x3, 0x1cc) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_newrule={0x38, 0x20, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_IFGROUP={0x8}, @FRA_DST={0x8, 0x1, @dev}, @FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}]}, 0x38}}, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0xffffffff, 0x628, 0xfd9, 0xbf05, 0x0, 0x4, 0x8020, 0x1, 0x0, 0x4, 0x8, 0x5, 0x6, 0xb908, 0x80000001, 0x1, 0x7fff, 0x2, 0x10e, 0x8, 0x40, 0x67, 0x6, 0xbf2b, 0x1000, 0x0, 0x7f, 0x80, 0x4, 0xfff, 0x0, 0x7, 0x6, 0x200, 0xfffffffffffffff9, 0x7, 0x0, 0x1000, 0x0, @perf_config_ext={0x1, 0xb50}, 0x2000, 0x8, 0x9, 0x5, 0x1, 0x9, 0x4}, r2, 0x1, r2, 0xb) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0xdb1) 23:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0), 0x4) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) [ 638.699870] input: syz1 as /devices/virtual/input/input3639 [ 638.728228] input: syz1 as /devices/virtual/input/input3640 23:56:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x80, 0x80) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = fcntl$dupfd(r0, 0x0, r0) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80000) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x90) [ 638.818044] input: syz1 as /devices/virtual/input/input3641 23:56:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ca2983776c2c67726b54", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 638.864820] input: syz1 as /devices/virtual/input/input3642 23:56:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc2240, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x22, 0x14, 0x6, 0x12, 0x7, 0xa543, 0x4, 0xfc}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x5) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0xffffffffffffffda, 0x3, {0x7, 0x1b, 0x1, 0x2, 0x7, 0x3, 0xffff, 0x2}}, 0x50) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r0, @ANYRES32=r0, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="452572366e30aa57bd1fde93923b99e385dc21a5e0faa1e744e59b21ed276bf6522d8e0574d9a2de653aa60b93f791bff2027beb5089411f2d1f7cd2", @ANYPTR, @ANYRESOCT=r1], @ANYRES32=r1]], 0x1000001af) 23:56:35 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x80, 0x80) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) [ 638.976577] input: syz1 as /devices/virtual/input/input3643 [ 639.000352] input: syz1 as /devices/virtual/input/input3644 23:56:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f0000002000)="a3c46b0e786ed3e5236988b5e9af2a16fb02bfbf5db5cc764519734bc538832e78a7e9cbff9168cd72973f9519516c78ad0026dee171f65e1193775587ca92c231e3648b2e45d2b7e9a12d73c10892abf5c22824efffbe39ddc72339833df3ee47156b2f30901f9677b44a5ac0dfef6e0b2c611434343750576a71da8b2ca2d7288d2b51821acd59b06ff8bdcaaef85565e6e63150d41ddd65cf9adec16f418aebc19f4879bd76e9487080b473637c09519e6427dba7abeec9336688057659640d8f075bd6a5b4b8e73d88102a14576b401c63c9df35c8b513cbddc5ca2489fca27ce70752d64c82ee7773f26c7b9cb46c5b9109e86afd2f5b8e70d4de5295d6b85c26ed569c9d9eaa160797de1c8e2b35890909545068ab5d5b0f4d52fca27fde94492ff954442468b494310991a7a655024d35edbf050b4da65bbeeea3cc5ff4914a49f12ab2fb157872177f69735cf3dfc20116f95c5abcddc5f407fc2914a0d6b1d06237c0b872ece8b8b2d8a4dcc8b913fe77aede01e0d9afa1f3974b1460e68de5d04d1d4e617565479cec6deebddf11452f187d30cbf34b2def871e989a3b3ec8524318c610569803c94cb06a4cba250a86a38e23c33ba2cc914a8597ab4be3254d6efd78f2a46c648b22b46f7243c66067b7421c16476b6a7c5d68b2e91837f7002426cdd1dc30c654d6b7279df39446e99d888cd36383cdfb0fce0faf1fd37ec686186e3ba590ddcb5b386c3351d7035cbb5a7df49a18719b351e1a07c4bd2bfc0a18119851dff2d185ef32fd603512f04cbe93b529a1503ef6aed184298e5bfa89873ba135300372ae3d53cc418baed0e2e94fafddb713033a7216205eed3b70eadf7fc44492afa33212241760960e862eae06d2e638adf036071c83b2841390df7c50991f6fc9f35f0ff91586c56f57c7ab2ee2d9caec122fae9ed2216b3f8a01d067d1f8670d358232135ac35f2ec8107df58e338f1c40bc3bf880b8ea569ba63a06d80e9563ac80b991c30d5f185984bf55e2647ef8902dfaddfd9d94487b3410f38c0f05351975b2cd98cf4a87cb1d018b9c6bbaf2359660a3e93d3b0d045f86d0fc5417f730771920ad1346ae267275e1a1a12e965325c046fb3badada9117442ba7caa4286f2a05e366a8e9d60c4bf2cdc7616a9165a8191afe46787e83ccead0a281b0dccdbaa1b2c163377c5f7b8e3c911090e550884f6aff22ee24a6e819466b675952f9265a7a02a68418bd9953cdbd491e5ac46b1f1b961909063cb5316ba6718413e98dc5c1fd1e772d295eacaf6f5dd5d6cc0be048a5fd0b79a09c2c1a754f04a56858ba27d95238139e75c8c4497ec6f095f97d3ea0c94c26588c9f0e277ec42f5e59803b193b6610579a71adf87b088fbf8951a7751f2306677d321ca47ab1be4fe1cb7bd0ee2c461f864dbe7d73cf4bc370d4d08d7989ccae4e312e2356f833ee601ad5e0e47c2b192834a0c9f20a842b60ec56c9138941d23eb68860e06b9b80894338ac19b1465eb2e8a8a25e727a0eea589776d628ec2879291080d3c6b80ce821e84432b512470c9a2108ef6161d9aea593a0095fafede66f4885aefd56a8e74b84786f58b9da4eb752f7e2810cb4dac6d6c5e55644ca4ea2e8dbac6636a9b79ae51ee7480dc215e083f5bb75638ed696186ae2ce1fb5ad18bff27f8500baa138b45160da09a8358719e5f67f484c89cac016bd0936b186720d0d64790a11c84af34801b1bf1148e9bd61a24dd78fc021cb636a7474081c9413a4f51a4e70bf1aaa03dc049f711a6b5fa9534bd4a939deed8284e6dc5315f36d44ee47277ef4a6811680660ad47da72467151b0407ade81664864e268eb985b59a103cc29fb47d2d3ccaa9218dd78cdcc040696e6b3e692d01f0a164875deba998f5b009c52bc3d59c2f42dabc3122ffcc3ff7201e1726c5bc05130b1ab41c5f62885268e37bb986c81aebc6d74c00895b7f042fa2bd46ff3f5349e9d11e7a6f2d9c0ae036bace2d7fafcb6290cd0c7a4a364ddbeec2d2893b9765cbdabcf69315b698332e2089677b926f1d9b43d9b9d08364e5890a0c37d74f9580e1b18bf2814f49786ea703cd769ac5c6c015442f561bcf3d7520d3e10c4107ee6442a4902ef5c6375555821ed9da87adc2b4bc03717adbd64a60f7c0a70f45b53bad24d09ebdf8b43d6351a84fcaa875521bda3cdc1beeed20ec33574a52a6be97737bce932b44695d87e90151daa6a5b100578e3092afec4be15bf24c5fc1009ecfe42157820eb95036aa3a1b3e36b0fad51c592d6841837aaa0c415f15fbf128fd5f4646b473e59038ed07aa38302c234f64d6516d1c7dd9cfc2729a515cbdf58dd46179b71a94b8f5e5f318f09998acb9c71ccd901609ca8f524503a88be3dbc9dd9d4e00fe4ac400ab26cbe0a9acd864ee0f72771861e1c3b42960db425d040a8c6f58ddda1dccd48e84a730097fcfa91473d5024bfe43257dd9b2dcef800572fe1fdbcc4278e50015f2c8545eda0454d6aa5ba469550dfb6decf197fa4d4aeb74ae82f68b9687731559318118edfac2b71ac71df6453df833786548f16a0bc428d7a14525f0a57bef7b58fc01c7f77120ed70e0f2d4297f534c7bc64ebeb24513fc834ae1209b669b6fce50ff421b0a1f9d849366b7f32f143cbef21a89d6ee325147749fb078212b12d1b520c07ec011b66b61b87b83784f519df85ebed5b904fef69e3fac3246fd0f3d3382ea95825a94b1d32585c31212f7e3ba5520f6986360128d99eb358e64fe6446834824fec9a9cd35311c51ead6673bdeebc460f4c44087c4dffbdd9b4a8c445c9219990483e7ee6d0d8cdb13c3cdd7f129da8e4a08321fefe282b91152fd797e3f804d01fd485619a8213bc789419a2e102996faf7ec50e3d787758762d98f60b5958124955531e7ec14a083bafc98c7020aaf76b5385a108654fc41c5ba032b0fc17f4fe38ef360829b21895cfbbc60da760aac115fe347185829bb8e3d27036411636e5895775f212b919327427f14062aef4fdabe4b7d57942b54d763f767776ca5a12b1e7d2651b0acbb7865658873b833fa9eb4e1afdb16037c89912c34ae1fbf3d473591a67a7b9d9e49396f0e3421aa79b3b226b09c75bc7d5c2e261a7b400602e180c85401148531dfc4145047ac358445106e311ac1454ef280af6bfb1f03c5db25bd9442a9cba01de4ed910a87976d65fd9ef8f1b672b106ecbe7189c6845566d5c235f9bd121b56569605521b4a2aaf3b5944546c31e6ee452243daf89e74fa7a537955b94b39b0d3a4c1bdb9901d93ee231c05a8e92f18522c9236d1a3b3fa8a3aa61ed97a6a1b7886e2bb15447d5fcf4b35e9779b377c15400b4adedae1466d044c9c264387a88fd52140befce81cdb9bf2f5a89ea6ec68c39801f0eda66aa1dc31c2959c6ecd3cacf8c17330de88cc639326f73c8c26d16177407b3964e81f95d484048556b8f5677ae35064d329ca8072d715e238fe178a5e505f2bca1738558d689f94d0ba1b2040a4423e485438f568048945b054b1793520c66c573ab07226bcae49849080890e1ad0d808c4d1b3ed4074f0c8af5b28608ba019f20217d0c47ec4d895a8ea970392705ef7b579536c212f4b7709baad194d770a03c46c708a50b657084e1a241e083bfd62b5823f3375235495c5f52046db46be23f5724b2098d0ccbcecf043467cc51bbbe61a7a2d38c7eacd6794e6b663081731b5b5d8e367153f248906436034d1d9c2cda740dbc411adb66127f09ab6d1d3823d4ec37817963c59a3853fc592a177a2eec4c26296bed75218c057bcba40b3245d7c3ce62e58708987e3424bfd5b174ac4cb56be3cadb01383e008db8c56cebd68a129a1ae68b9197b7d2b90894faf067852b5ad2193e46c34b17297bd49f35956d16f5728b134be25ba39fcfd54b10b0c2c605d3cb01ac325ccc5271dda0e1f4e66883e68de034a020e695c922619dda428d87d3a2b4234c3df051253a88340788dcd5480b6612b3b2e1ae4c5830b5f1422ad9b5ba5f54998ed762f2d1c01c888731681ed40c3727aa3963ade72b42411947b4ce71b91c399ab61dd1d011a7281b85063ea4ae331140daa48c1bd22b67d0efa3d5fa8fc1d79bb4a1e68c346d43d211096951f5b6e8a15f9ae4456ff7770605ac920f0b554abc02776973665623d297ad13c0128f2ca9fb312c1febe12e3a8b2165dc99ffcaec7ee8d1ac83c6db7c907f2d4803558a36901499a893eeb98f4a41f5a4d1f95723f053d8176e619b854947832bdf2b198d1ba340aee187c15ba64864e554d5b9f87318a6836c9a91aa200e451c216d3c89d37a87772bd37e9dee95f544b0701519c6cb9bbbde02105f9b6310cdefbfc4fe41fa95481e0d7797de5d1ddc666b5dcb4633bbb31da460f96495a49952a85da11fb90f00514d6aa4c606706ee0972cd931411dae864c63bf258ea01cfa13abe30aef45d7bf8dfebd524718325c1fcfbb126f7cfdbb0e722ed995ae3a6b14a279dc9425a56360c567c5485c9e9a51153aa5cc4f5027ae4e9cb90f3a9edbda244ef16944bb2e25b8ca746b3a926de8087b156261ae93073c8cc8c293b8cfe18f2e238235ef49b0a0508a4dc148236968093f3b82b7e1b7c2a5c7cbba59696b32ab1f497def919d4de7ab72b270a000b71f09e6474ce0275f852a092eeceeec53ed1c32ed58f818e7461503d8201e5aab3c178c3ff463025d9038087c80d54827e8d2ce6096ab46883cb96d7d4f13b20bdc28bccf347db37b8e8c50e8312848c7016a150806c3ce6626fe3761a546850529f39097afe14634d228ad9350a280b7126ffa637e4b608ff046f831543f46509b34302acd0bc715db939b537f4510d1b06a5ec7acb3ad519d088e4f0e8e04a37adccf65e6c2ece7f7d0e41c69d5c2fc4e9d52b47b9368c895508780f3ba1474da6bc239556357413ed0b30fe9c67f28e320a27d34dafad72c309dbc227aa77c44d0090f6a5c8c82b25af39fb6fe0b0ac7a42380f1ae58bec85259dbc6afb328352289bde346b46fe595be33c5ffcda9b3503606332e0e61eba78fe6c7ebb8d9d2d6eedf711fd39577c6424bdc76a9903b51b034d3e21c92a7d22eac4d7a2d6b183baae6cff746cbd2833c985c7a2d402680696bb1bc3f0f21d6f1363d06e1413a19119975a15478863443548212830fd9a47b08c28260e322671df244c1b7997ede0bb642815cc02a5457c5211404459295ca7948db835ef438b177b9eaa2dc17e42511e55013a6b532ac28a2b7eba5c233ebcfb7342c90aefd4052fc00029b2d90ba013ac7f628ed24f1a47b0766f87fcab09af9e362159386e9e56c08953b3a529c9f38434d29b1c2dfd828361d2159d9f6ae72ca22f448fab69239071446b093f374a8a0fcf577d88cf7b6a1d301199f6645eb09ff7fe350d051a1ad0848bf15b2e4993a6a9b2aad3a48b5a97be7fc540bdd2821c0231fc5878b6f45deb2cf77d467158ba5c259728d8715b9acd88b62b899776c452e774436ad385c324c4a0dc8b54bd81bc5392b05dd24295acf5d6d0769918e889b8e8a0d6472dcbec02665e36f6cc5e0f01b2be39dc88de99f6b4c3fa161890a987998d1a6d9d41fe06d4f65fef7fc5611eb4521e2a002b1a4472cec2cd4b3b73aa5ed94526e28bc159952cb9bb1fe68feb95b9191f47db8150b28f3394c9b56e76fe65646e3c158012db0f47ea5c0f93da82fd9692a7dd946a698194953e694ea313f11ed662cda97fd283fdc705eb11ac42c171f68fc0363e4", 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) tee(r0, r0, 0x7, 0x6) r2 = dup(r1) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000080)=[0x7, 0x4]) [ 639.050872] input: syz1 as /devices/virtual/input/input3645 23:56:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 639.106258] input: syz1 as /devices/virtual/input/input3646 [ 639.134886] input: syz1 as /devices/virtual/input/input3647 [ 639.198584] input: syz1 as /devices/virtual/input/input3648 23:56:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[{0x4, 0x8}, {0x4, 0x1}], 0x2) 23:56:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0xfffffffffffffef2) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) sync_file_range(r0, 0x7f, 0x4, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RREAD(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="b0000000750200a500000057f3f8c6156e496e14b24d5337c9e1e2fb151f9ce02cdb2ac33678fbad0506e59d8013fbe35a39066cc912cdc9dd032ca54c4d798864230062d1d6e9da1b6cf911d69ab751885787c349d83117f5f801da16330e99a855dc1cb6302e2006154560d6ba16ba360c78e8dc7b5ae98144ecbe58c562cd292b3d6fe8421665f23795b9145b8e1e11e28b66d64dd652ac1736f316de36bba95b813cc6ac775ae706ea97f7293c59"], 0xb0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 639.269782] input: syz1 as /devices/virtual/input/input3649 [ 639.330754] input: syz1 as /devices/virtual/input/input3651 [ 639.363777] input: syz1 as /devices/virtual/input/input3650 23:56:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 639.506980] input: syz1 as /devices/virtual/input/input3652 23:56:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x8}}, 0x18) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) io_setup(0x9, &(0x7f0000000000)=0x0) io_destroy(r1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x80, 0x80) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 639.830153] input: syz1 as /devices/virtual/input/input3653 [ 639.842984] input: syz1 as /devices/virtual/input/input3654 [ 639.883846] input: syz1 as /devices/virtual/input/input3655 23:56:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{0x100000000007ff, 0xb360, 0x0, 0x80}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000002000), 0x1000) sched_setaffinity(0x0, 0x3cb, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x800000000002, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x4011, r1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x14, 0x27, 0x20, 0x70bd2c, 0x25dfdbfd, {0x9}, [@generic]}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x20004044) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000], [0x7fffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) 23:56:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x10, 0x1) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 640.004080] input: syz1 as /devices/virtual/input/input3660 [ 640.025215] input: syz1 as /devices/virtual/input/input3661 23:56:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:36 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 640.139235] input: syz1 as /devices/virtual/input/input3662 23:56:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$TIOCSBRK(r1, 0x5427) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20100, 0x0) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 640.278493] input: syz1 as /devices/virtual/input/input3663 [ 640.292866] input: syz1 as /devices/virtual/input/input3664 [ 640.306305] input: syz1 as /devices/virtual/input/input3665 23:56:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="28000000040000000000000000000000180100000000000002000000000000000000000000000000"], 0x28) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) eventfd(0x3) write$FUSE_INIT(r0, &(0x7f0000000180)={0x39b, 0x0, 0xfffffffffffffffe, {0x7, 0x1b, 0x0, 0x80000, 0x5, 0x40, 0x0, 0x1}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000004000002b7379737465746a48b01b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 23:56:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000240)='fuse\x00', 0xfffffffffffffff9) keyctl$invalidate(0x15, r1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000f5ffffffffffff8a000000000066ce656d316e6f246576656d240014206a9731f300000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 640.733491] input: syz1 as /devices/virtual/input/input3666 [ 640.747324] input: syz1 as /devices/virtual/input/input3667 23:56:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x830, 0x4) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x0, 0x0, 0x0, 0x2000000000000000]}, 0x45c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xf) read(r1, &(0x7f0000001d40)=""/4096, 0x1000) fcntl$getown(r0, 0x9) [ 640.823165] input: syz1 as /devices/virtual/input/input3668 23:56:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:37 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 640.915235] input: syz1 as /devices/virtual/input/input3669 23:56:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) [ 640.970694] input: syz1 as /devices/virtual/input/input3670 [ 640.991920] input: syz1 as /devices/virtual/input/input3671 23:56:37 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000e80)={@loopback, 0x3f, r2}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 641.099411] input: syz1 as /devices/virtual/input/input3672 [ 641.113094] input: syz1 as /devices/virtual/input/input3673 23:56:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6dcb78bb329efd300000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c1461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = memfd_create(&(0x7f0000000040)='fd', 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000000c0)={0x6, 0x5}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffd}, {}, {0x0, 0x0, 0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0xa, @in6=@loopback}}, 0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r0, 0x5502) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e1d, 0x0, @local}, 0x1c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000000c0)=r3) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) fstat(r1, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000880)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000ec0)=0xe8) getresuid(&(0x7f0000000f00), &(0x7f0000000f40)=0x0, &(0x7f0000000f80)) write$apparmor_current(r4, &(0x7f0000001100)=@hat={'changehat ', 0x3, 0x5e, ['syz1\x00', '\x00', '/dev/uinput\x00', '/dev/uinput\x00']}, 0x3b) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10000, &(0x7f0000000fc0)=ANY=[@ANYBLOB, @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,max_read=0xfffffffff3c0b1dd,default_permissions,blksize=0x0000000000000800,seclabel,dont_appraise,uid>', @ANYRESDEC=r7, @ANYBLOB=',fowner>', @ANYRESDEC=r8, @ANYBLOB=',\x00']) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) close(r0) read(r0, &(0x7f0000002d00)=""/4096, 0x1000) 23:56:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 641.553227] input: syz1 as /devices/virtual/input/input3676 [ 641.576216] input: syz1 as /devices/virtual/input/input3678 23:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 641.635448] input: syz1 as /devices/virtual/input/input3679 [ 641.647919] input: syz1 as /devices/virtual/input/input3681 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '\x00'}, &(0x7f0000000080)='*\x00', 0x2, 0x3) [ 641.733366] input: syz1 as /devices/virtual/input/input3682 [ 641.743938] input: syz1 as /devices/virtual/input/input3683 23:56:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643da9545083bf38862d32d9f831ab8fe1d2a6609c4145041bfa1504eea85dc7072b89218f64018f44c3af9f957a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xffffffffffffffe4) fallocate(r0, 0x8, 0x66000000000000, 0x5) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe, 0x0, 0x4}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x48000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x6, 0x1, 0x6, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) truncate(&(0x7f0000000340)='./file0/file1\x00', 0x8000) 23:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0x2, {{0x2, 0x4e22, @loopback}}}, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffffff) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78, 0xfffffffffffffff5, 0x2, {0x400, 0xcd7, 0x0, {0x1, 0x7, 0x0, 0x5, 0x5, 0x1000, 0x1800, 0x2, 0xfffffffffffff39e, 0x80000001, 0xf1, r1, r2, 0x6, 0x1}}}, 0x78) read$FUSE(r0, &(0x7f0000001000), 0x1000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x4d0, 0x0, 0x2e0, 0x2e0, 0x1f0, 0x1f0, 0x400, 0x400, 0x400, 0x400, 0x400, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xc8, 0x1f0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x1, 'system_u:object_r:systemd_logger_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffff, 0x59, 0x30}, {0x0, 0x5, 0x7fff}}}}, {{@ipv6={@local, @ipv4={[], [], @remote}, [0x0, 0xff000000, 0xffffffff, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff], 'lo\x00', 'bcsh0\x00', {}, {0xff}, 0x3f, 0x10000, 0x1, 0x40}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d6, 0x4, 0x7f, 0x1}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 641.872474] input: syz1 as /devices/virtual/input/input3684 [ 641.878023] input: syz1 as /devices/virtual/input/input3685 23:56:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 641.897611] input: syz1 as /devices/virtual/input/input3686 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x20000000007, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x9, 0x1000}}, 0x30) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) memfd_create(&(0x7f0000000040)='fuse\x00', 0x1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000001000000000007000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5ad2683276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 642.025465] input: syz1 as /devices/virtual/input/input3689 [ 642.039785] input: syz1 as /devices/virtual/input/input3690 [ 642.089285] input: syz1 as /devices/virtual/input/input3691 23:56:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000001540)=@ax25={0x3, {"b715be1145a366"}, 0x8}, 0x80) 23:56:39 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1a52204a2410b308) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x4000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d24000000000000000000000000973c469505718f1d18f87f000079c8743afcf520002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f75702463670000000000"], 0x90) 23:56:39 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 642.726381] input: syz1 as /devices/virtual/input/input3692 [ 642.744572] input: syz1 as /devices/virtual/input/input3694 [ 642.754014] input: syz1 as /devices/virtual/input/input3693 23:56:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:39 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup2(r0, r0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00', 0x45}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) [ 642.885516] input: syz1 as /devices/virtual/input/input3695 [ 642.912270] input: syz1 as /devices/virtual/input/input3696 [ 642.931898] input: syz1 as /devices/virtual/input/input3697 23:56:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b010000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f75702c828958662463670000000000000000000000"], 0x90) 23:56:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 643.010798] input: syz1 as /devices/virtual/input/input3698 23:56:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6affff0bb838d75a1e024ef01cfc56da4d9e3a7fa1b7278c38244148e5c12c1e04d3259c047c04e527642b3fbb05562a28e6c17f5e252e69ac531e8b655f6348a308b7cca7c999833090d756089b02994e106f9138f1df66246f6128dc690fb6ba837d8b70", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0xfdc038af95ba320) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)=']keyringppp1\x00', 0xfffffffffffffffd) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PIE_ON(r3, 0x7005) keyctl$assume_authority(0x10, r2) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f00000006c0)=""/162) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r4, &(0x7f0000000800)=ANY=[@ANYRESHEX, @ANYRESOCT=r4, @ANYRESHEX=r4, @ANYRES16=r3], 0x3d) 23:56:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x8, 0x5, 0x22bd, 0xbf}, {0xffffffff80000000, 0x2, 0x1, 0xffffffffffffffe0}]}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) dup2(r0, r0) 23:56:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d69982d98ed3977a088b5a362380fe704d608ea15cb58130200dc076bfae1f0406855d4366b2a19d188e788a9115c71df2ec3909e0c493d86d1dfe702b06fddbaeaa50577591e252120a579692a84f967e6f02b36001d46a5f4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x240200, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fuse\x00', r1}, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000020000000000000008b000000000066ce656d316e6f242576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 643.676802] input: syz1 as /devices/virtual/input/input3699 [ 643.689153] input: syz1 as /devices/virtual/input/input3700 23:56:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'ipddp0\x00', {0x2, 0x4e22, @rand_addr=0x5}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030030030303030303034303030302c75737a725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x90) 23:56:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 643.749519] input: syz1 as /devices/virtual/input/input3701 23:56:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:40 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) select(0x40, &(0x7f0000000040)={0x80000001, 0x80000000, 0x5a3, 0x7ff, 0x6, 0x4b3, 0x4, 0x3}, &(0x7f00000000c0)={0xffffffffffffff82, 0x415c, 0x80000001, 0xc668, 0x8, 0x6, 0x6, 0x5}, &(0x7f0000000180)={0x7, 0x3ff, 0x40, 0x100000001, 0x1f, 0x5, 0xe7, 0x1ff}, &(0x7f00000001c0)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9005000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d2400214998d684b370401da1f818a25da200000000000000000000000000002c000000000000619f053823b7c94f3b9c76ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700708d581e1bd2d0350000000000000008b6ca47e72271828831dc9aafab89c7092c20492ceba100ce95edbdb381bd93204c17016387b46815cd45d4003e47706c7a3298c38d62a767e2c4"], 0x90) [ 643.858669] input: syz1 as /devices/virtual/input/input3702 [ 644.474603] input: syz1 as /devices/virtual/input/input3703 23:56:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',@']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) [ 644.633432] input: syz1 as /devices/virtual/input/input3704 [ 644.637621] input: syz1 as /devices/virtual/input/input3705 [ 644.641328] input: syz1 as /devices/virtual/input/input3706 23:56:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x8, 0x1, 0x0, 0x1, 0x22}, 0x2c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f0000000080), r1, &(0x7f0000000100)=0x3a, 0x7, 0xc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) write$FUSE_DIRENT(r32, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:41 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000000)=""/94, 0x40}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x20b) rt_sigpending(&(0x7f00000001c0), 0x8) 23:56:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 644.764997] input: syz1 as /devices/virtual/input/input3707 23:56:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2002) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000000)={0x10, 0x9, 0xffffffff}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/160) [ 644.838844] input: syz1 as /devices/virtual/input/input3709 23:56:41 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 644.880264] input: syz1 as /devices/virtual/input/input3710 [ 644.920367] input: syz1 as /devices/virtual/input/input3711 [ 644.932714] input: syz1 as /devices/virtual/input/input3712 23:56:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa20, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = accept(0xffffffffffffffff, &(0x7f0000000d40)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000880)=0x80) connect$netlink(r1, &(0x7f0000000dc0)=@unspec, 0xc) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x3, 0x3, 0x400}}, 0x30) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:41 executing program 4: socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 645.035860] input: syz1 as /devices/virtual/input/input3713 [ 645.089232] input: syz1 as /devices/virtual/input/input3714 23:56:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:42 executing program 4: socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:42 executing program 4: socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 645.506431] input: syz1 as /devices/virtual/input/input3715 [ 645.577301] input: syz1 as /devices/virtual/input/input3716 23:56:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:42 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x2b, 0x3, 0x0, {0x2, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x2559}}, 0x50) utimes(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)={{0x77359400}, {0x0, 0x7530}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0xffffffffffffff38) 23:56:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x80003, 0x40003, {0x7, 0x1b, 0x0, 0xfffffffffffffffe, 0x2, 0xffffffffbfffffff, 0x1, 0xfffffffffffffffe}}, 0x8d81) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[], 0x7c57) 23:56:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 645.645070] input: syz1 as /devices/virtual/input/input3717 23:56:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 645.727518] input: syz1 as /devices/virtual/input/input3718 [ 645.771366] input: syz1 as /devices/virtual/input/input3719 [ 645.842493] input: syz1 as /devices/virtual/input/input3720 23:56:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) memfd_create(&(0x7f00000000c0)='syz1\x00', 0x6) 23:56:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:42 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.026072] input: syz1 as /devices/virtual/input/input3721 [ 646.048771] input: syz1 as /devices/virtual/input/input3722 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.077245] input: syz1 as /devices/virtual/input/input3723 [ 646.090680] input: syz1 as /devices/virtual/input/input3724 [ 646.140948] input: syz1 as /devices/virtual/input/input3725 23:56:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() getgroups(0x3, &(0x7f00000003c0)=[0xee01, 0xffffffffffffffff, 0xee01]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000900)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mount$fuse(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000340)='fuse\x00', 0x800004, &(0x7f0000000800)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}]}}) ftruncate(r0, 0x1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) r5 = dup2(r0, r0) ioctl$UI_SET_RELBIT(r5, 0x40045566, 0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x1008090, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0xff}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, "47504c47504c637075736574e947504c"}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x65, 0x77, 0x0, 0x77, 0x72, 0x33, 0x7d], 0x2d, [0x36, 0x62, 0x77, 0x37], 0x2d, [0x75, 0x66, 0x65, 0x37], 0x2d, [0x38, 0x7e, 0x77, 0x31], 0x2d, [0x33, 0x65, 0x7b, 0x79, 0x76, 0x34, 0x66, 0x31]}}}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}, {@fowner_lt={'fowner<', r3}}]}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) quotactl(0x3ff, &(0x7f0000000180)='./file0\x00', r3, &(0x7f00000002c0)="e1a00906e0f601b9614345e3d8a86494f624ae8cf63b10bd12ac0b6a78e4a7a0514acf379e2f1289514171dcf489205d9e26ce8a4bd6c9c07ac7d7071e0e91e586cc211b5edd") 23:56:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2067726f757005008000000000007aedb12387c6a0bf8b780000000030cfc0bad3f6989f4ff51a85e6fcb1694e45", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000180)="09059ef8411f4453ac2fa7c78139ff8e1b4a0c8387d5804368a7b16b2e972f35dc8089294214bec6f55b11ebb280f89d35591733e8a36e81cd9308c8d1c7871b1f593dee2360297c7879f8ffdc56e7a5b761ee17f7e440819c329b781b0b1909fe37789d9bb678ffb7d971f71cb42caa4f305dd4f1ab4844"}, 0x10) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000100000000bb35000000008b000000100066ce656dcb6e6f246576656d240000000000000000000000e20000002c0000000000006100000000000000003276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = dup(r0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 23:56:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.568910] input: syz1 as /devices/virtual/input/input3729 [ 646.587860] input: syz1 as /devices/virtual/input/input3731 23:56:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$dupfd(r0, 0x406, r0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d2400000000000000000000002c000000000000619f0538a8101d4a38c676bb8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc63707573657400000000000000000000000000000000000000000000000000"], 0x90) 23:56:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002cb9e900000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:43 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)={0xa, 0x200, 0x7fffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.657831] input: syz1 as /devices/virtual/input/input3732 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.723276] input: syz1 as /devices/virtual/input/input3733 [ 646.755447] input: syz1 as /devices/virtual/input/input3734 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 646.771226] input: syz1 as /devices/virtual/input/input3735 [ 646.810576] input: syz1 as /devices/virtual/input/input3736 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = dup2(r0, r0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) fstat(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)=0x0) r9 = geteuid() getresgid(&(0x7f0000000f40)=0x0, &(0x7f0000000f80), &(0x7f0000000fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000001000)='/dev/uinput\x00'}, 0x30) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001140)={0x0, 0x0, 0x0}, &(0x7f0000001180)=0xc) sendmsg$netlink(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002d00)={0x22fc, 0x11, 0x202, 0x70bd27, 0x25dfdbfb, "", [@nested={0x2018, 0x44, [@typed={0x1004, 0x35, @binary="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"}, @typed={0x10, 0x5d, @str='/dev/uinput\x00'}, @generic="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"]}, @generic="5dbf0c432c282b078b1024612547867ed707b1aeac093a83cf1383f6dbba61d0e75824b7a0f3e8454e759040275a33ebdda44cec406ff9d84cd224bc83c80276de3c7000fbe87924bfb71f528b5b5efc1970bcf517aaa4b9070ac078b27a896615ac4dd04a1edfac68e79280e09befae40a037b289805481388d896834fca364dee0101ab3b74d49fc6ab6a44cf0825bcf49143a1bed638ac40ec39d447eab19c42394b07facbcb30e03995e697b54492451c332d6c492b406e8217c2370bd054ddf0d11018ecfdf1d1147a4800eb43553dbf6d0cc0ab923d9e81c585897dbac21031b6723d24a89cb6ab24d23ee", @generic="37086d23a138e7d9c0d11da298c21a932fda6b3c85bcc3f07069448ad0d52d68af6d597208500171d2e0fdd15128d513bbe99688008098be3f6bd8b008f9d3d79cef8ca4fb15720f3ff6ef96438a3ddc595e125e2031c10e27fc444b784ffdb80fc4cd11e0f3941436ac1ccbfd5da7a2a7f6e3d95cc1ff0eb3c6ba", @generic="0a63355b71e90611fa27727b5bb08895844a816191bbe4895330426d53a05e1ff778836f0e21ce3ad624978dbe400382398f6e9fa84b324edc3672930d6cb7b8e65b157f8b4e795ffa807765a45dc549015e70fbe2bcf4b008c41797eb8c6c2610c7429c33fd782da61e5914e55b85", @generic="aed9935be662e49e3ef09756951fdebb52faff1220c5de316b74b8a8d38050fdb2b87db6cef4cc436c21410eba569ed9bc27ddf1cc131d77d624bebf2f1126981444b1fa4b7fadde6c2f7b87f823f44477f82635767bd4b5a1c51596fb84c5b571cc53a7014b420582c45af9167c666114803b46295627d90d6590c79966adbdc453f1f53ce87ea53897d264517b34ae5355a3ed14df901391aaa274995b576388edfb65d24c606fb7b3a3b6e4737328966da101b5bcd62554fff01ca3d4fe34e9836bf79bf3f98e43ea191a9eff9ca94c63b653efeb55e7f7ea4688f61ece93a9e5c9aa2e26c7e213f8463f4d7489a1952285631076e9954d"]}, 0x22fc}, {&(0x7f0000000080)={0xe8, 0x15, 0xc, 0x70bd25, 0x25dfdbfd, "", [@typed={0xc, 0x55, @str='cpuset\x00'}, @generic="dd34fd1ca4a1c1e48e424983fab464e844b2ccbfa37ee7ce286bc1ac312ebe7aa5cd736464018ee511bcb36f5995fac5881263a544f85fde1bf98000473f67efe8030bbf00fcbddef0f5e0e92402d69f66f3bb3110963c7fbcc002ec46984351f0619cc6cf5c2a1ec5fa453d5a50853668238d278ff097eadea36dad9dd07e695aaa6d6c33f4521491f77b445b9f66a649e7402250cd87a9cbc13277cbfd22994a686ca08c0ef8b6944cea2f07303a60b6167746a243a02f3c1214effa09adb222d1f8008203ee1acf"]}, 0xe8}, {&(0x7f0000000180)=ANY=[@ANYBLOB="940000002d00000327bd7000fcdbdf68e20a005817702a96b63428cf9aa799867049edcee70af980db51f30bc9534b476e27a37eff7b149da4a182f35147114b5075b1d8dc86e61a1acca09967cb8b42a3d62ab9225d13db2240f71e970e9886921b1d31416197f25ff13bbe5e31b2b32098bc835bbdb208008d0000", @ANYRES32=r0, @ANYBLOB="08000e00000200000c0087000100000000000000"], 0x94}], 0x3, &(0x7f00000011c0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0xa8, 0x40}, 0x20000040) [ 646.914889] input: syz1 as /devices/virtual/input/input3738 [ 646.954636] input: syz1 as /devices/virtual/input/input3739 23:56:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) socket$inet6_udplite(0xa, 0x2, 0x88) [ 647.005647] input: syz1 as /devices/virtual/input/input3741 23:56:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x0, 0x400000000000004}, 'syz1\x00', 0xc}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) renameat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) [ 647.459927] input: syz1 as /devices/virtual/input/input3745 23:56:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7852586b42d7815c45ad30a0629000000000000000020000000000000001000000000000000000008b000000000066ce6584316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367000000"], 0x90) getrusage(0x1, &(0x7f00000002c0)) 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x100) openat(r1, &(0x7f0000000080)='./file0\x00', 0x22240, 0x46) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r2, r3/1000+30000}}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x4c001, 0x20) write$apparmor_current(r0, &(0x7f0000000280)=@profile={'stack ', "b600"}, 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000001c0)) read$FUSE(r1, &(0x7f00000030c0), 0x1000) prctl$seccomp(0x16, 0x2, &(0x7f00000000c0)={0x8, &(0x7f0000000040)=[{0x50, 0x5, 0x1, 0x3}, {0x7f, 0x8, 0x200, 0x3f}, {0xffffffff, 0x55, 0x1, 0xfffffffffffffeff}, {0x1ff, 0x8, 0xffffffff, 0x4}, {0x2, 0x80, 0x1ff, 0x4}, {0x3, 0x1cad, 0x7, 0x8001}, {0x4, 0x8, 0x1000, 0x2}, {0x80, 0x80000001, 0x100, 0x9}]}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe, 0x7f, 0xffffffffffffffff}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000680)=ANY=[@ANYRESOCT=r1], 0xffffff3f) [ 647.572025] input: syz1 as /devices/virtual/input/input3747 [ 647.596666] input: syz1 as /devices/virtual/input/input3748 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{0xfffffffffffff0a4, 0x4}, 'syz1\x00', 0x4000002}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 647.680345] input: syz1 as /devices/virtual/input/input3749 [ 647.699677] input: syz1 as /devices/virtual/input/input3750 23:56:44 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00'}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x288441, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000180)={0x8925, 0x0, 0x1}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f00000000c0)=r6) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_WRITE(r7, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x7, {0x8000}}, 0x18) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x802, 0x0) [ 647.775453] input: syz1 as /devices/virtual/input/input3751 [ 647.819576] input: syz1 as /devices/virtual/input/input3752 [ 647.842022] input: syz1 as /devices/virtual/input/input3753 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x994) [ 647.957059] input: syz1 as /devices/virtual/input/input3754 [ 647.970576] input: syz1 as /devices/virtual/input/input3755 23:56:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$FICLONE(r0, 0x40049409, r0) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 648.045716] input: syz1 as /devices/virtual/input/input3756 [ 648.063762] input: syz1 as /devices/virtual/input/input3757 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{0x9, 0x10000, 0x7}, 'syz0\x00', 0x53}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x0, @tid=r3}, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x9, 0x2, 0x527, 0xa97}, 'syz1\x00', 0x53}) [ 648.146832] input: syz1 as /devices/virtual/input/input3758 [ 648.163862] input: syz1 as /devices/virtual/input/input3759 23:56:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f0538"], 0x48) 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = memfd_create(&(0x7f0000000000)='syz1\x00', 0x2) sendto$inet(r1, &(0x7f0000002d00)="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", 0x1000, 0x0, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x3}, 0x10) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[], 0x0) [ 648.330401] input: syz1 as /devices/virtual/input/input3760 [ 648.353076] input: syz1 as /devices/virtual/input/input3761 23:56:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0x90) 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) ioctl$TIOCCBRK(r1, 0x5428) [ 648.488719] input: syz1 as /devices/virtual/input/input3762 [ 648.507267] input: syz1 as /devices/virtual/input/input3763 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x100000a, 0x10, r0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{0x4, 0x0, 0x10100, 0x2}, 'syz1\x00', 0x3fffffffffffffd}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x0, 0x81, 0x800, 0x2c7, 0x2800000000000000, 0x7fff}) [ 648.617470] input: syz1 as /devices/virtual/input/input3764 23:56:45 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(0xffffffffffffffff, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) chown(&(0x7f0000000040)='./file1\x00', r1, r2) [ 648.661918] input: syz1 as /devices/virtual/input/input3765 [ 648.684275] input: syz1 as /devices/virtual/input/input3766 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) write$FUSE_DIRENT(r32, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 648.790470] input: syz1 as /devices/virtual/input/input3767 [ 648.854343] input: syz1 as /devices/virtual/input/input3768 23:56:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x100000000, &(0x7f0000000040)="a894f7464875330adf61643b7d22442978f7098159a9b63f70c2f291296f47cf279926b8f22ec9874791902837f8cc14928dc9d89d360d9b9551882bc4b4e8becf1a1defc0a10c1fefa210512ce6600e53b97dc454d403fbca4d55ee4d3f8bd291cb350b3616f68104de151a82dcfaa5c5a5e59b330a543e53f001129f0ec842c09e8d710adc90d801c0b3b8791a6f49bc7d068fefd9f70d2ac97580505519176bf0ddd4e8b20464569efeb7e18608d20a9b802bc8b397") write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0xe36]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000200)={0x97d, 0x0, 0x1}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) [ 648.976779] input: syz1 as /devices/virtual/input/input3769 [ 648.993887] input: syz1 as /devices/virtual/input/input3770 23:56:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be"], 0x6c) 23:56:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000080)={0x6}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000004d00)=""/4096, 0x80) 23:56:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) [ 649.180658] input: syz1 as /devices/virtual/input/input3771 [ 649.197158] input: syz1 as /devices/virtual/input/input3772 23:56:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = getpgrp(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) syz_open_procfs(r1, &(0x7f0000000000)='attr/keycreate\x00') read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:46 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 649.285239] input: syz1 as /devices/virtual/input/input3773 [ 649.310832] input: syz1 as /devices/virtual/input/input3774 23:56:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) listen(r0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), &(0x7f0000000080), 0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) socketpair(0xa, 0x2, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x9a4be7df0fc7d1f4, 'rdma'}, {0x0, 'pids'}, {0x2b, 'cpu'}]}, 0x11) read(r2, &(0x7f0000002d00)=""/4096, 0xfffffffffffffea4) [ 649.350205] input: syz1 as /devices/virtual/input/input3775 23:56:46 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) [ 649.412195] input: syz1 as /devices/virtual/input/input3776 23:56:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x48000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x6, 0x1, 0x6, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f00000002c0)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) truncate(&(0x7f0000000340)='./file0/file1\x00', 0x8000) [ 649.464316] input: syz1 as /devices/virtual/input/input3777 [ 649.472773] input: syz1 as /devices/virtual/input/input3778 23:56:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='sd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='fuse\x00') lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x90) 23:56:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200000) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x800000, &(0x7f0000000f80)=ANY=[@ANYBLOB="3f3c99", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c28314c98af034183c93d", @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,rootcontext=staff_u,fowner=', @ANYRESDEC=r4, @ANYBLOB=',smackfsfloor=/dev/uinput\x00,fsname=/dev/uinput\x00,dont_hash,euid>', @ANYRESDEC=r5, @ANYBLOB=',\x00']) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000002c0)={0xab, 0x28, 0x1}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) write$FUSE_DIRENT(r32, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 649.674961] input: syz1 as /devices/virtual/input/input3781 [ 649.706407] input: syz1 as /devices/virtual/input/input3782 23:56:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024"], 0x7e) 23:56:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'bridge_slave_0\x00', &(0x7f00000040c0)=@ethtool_per_queue_op={0x4b, 0x7, [0x617, 0x10001, 0x3f, 0x5, 0x4, 0x2, 0x9, 0x3, 0xda, 0x8001, 0x89, 0xdbc, 0x286f2fb8, 0x5, 0x581, 0x2, 0x5, 0xf4, 0x1, 0x5, 0xe3e5, 0x6, 0xcca, 0x4, 0x0, 0x60e, 0x243, 0x0, 0x8, 0x1000, 0xfffffffffffff0a3, 0x10001, 0x1, 0xce9, 0x8, 0x7ff, 0x7, 0x1d1, 0x9, 0x3ff, 0x0, 0x5, 0x100000000, 0x8, 0x6c74aec0, 0x6, 0x7, 0x2, 0xd6, 0x5, 0x1ff, 0x8, 0x0, 0x6b06849d, 0x401, 0x80000001, 0x2, 0x9, 0x8, 0x81, 0x8001, 0x0, 0x100, 0x0, 0xc, 0x800, 0x3f, 0x6f8e, 0x401, 0x5a11, 0x8, 0xffffffff, 0x7, 0x44e, 0xffffffff, 0xfffffffffffffe01, 0xa, 0x8, 0x10000, 0x7, 0x200, 0xd8, 0x7, 0x6, 0x8001, 0x18a, 0x412b, 0x100, 0x3f, 0x7, 0x8, 0x3, 0x400, 0x7, 0x100, 0x6, 0x7, 0x80, 0x8, 0x5, 0x40, 0xe097, 0x40, 0x5, 0xff0, 0x7, 0x3ff, 0x7, 0x7fff, 0x1, 0x3f, 0x7, 0x2, 0x0, 0x6, 0x10000, 0x8, 0x8, 0x2, 0x2, 0x6c, 0x6, 0x5, 0x8, 0x8, 0xffffffffffff3493, 0x3, 0x8, 0x3f, 0x7, 0x1ff, 0x5, 0x100, 0x0, 0xffffffff00000001, 0x100000000, 0x2, 0xffffffff7fffffff, 0x80000001, 0x4, 0x1, 0x1, 0x1, 0xfffffffffffffffd, 0x800, 0x5, 0x4, 0x5, 0x81, 0x2, 0x7f, 0x32d7, 0x6, 0xfffffffffffffffc, 0x9, 0x101, 0xec, 0x8, 0x9, 0x0, 0x7, 0x3b7, 0x9, 0xad, 0x8, 0x39, 0x7a1a0bbb, 0x2, 0x20, 0x3ba, 0x400, 0x49d, 0x0, 0x800, 0x50, 0x80000000, 0x10000000000000, 0x9, 0x6, 0x1, 0x7, 0x9, 0x6, 0xa9ed, 0x5, 0x5, 0x7, 0x0, 0x8, 0x5, 0x0, 0x4, 0x0, 0x4f, 0x0, 0x59a7f7a3, 0x4, 0x8, 0x5, 0x80, 0x6, 0x0, 0xba5, 0x20, 0x0, 0x8001, 0x1000, 0x401, 0x5, 0x5, 0x9, 0x7, 0x6, 0xdd4, 0x941, 0x5, 0x81, 0x4, 0x3, 0x7fff, 0x4, 0x1ff, 0x4, 0xffffffffffffff01, 0xe66, 0x2, 0x4, 0x3, 0x20, 0x2f5f, 0x3, 0xee, 0xffff, 0x10000, 0x4b9, 0x4, 0x0, 0x7, 0x0, 0x9, 0x7, 0x7ccb, 0x26, 0x4, 0xfffffffffffffffc, 0x6, 0x80, 0x40, 0x1, 0xfffffffffffeffff, 0x2, 0xbf, 0x8, 0xffffffffffffff7f, 0x7fff, 0x3, 0x3, 0x8, 0xfff, 0x2, 0x3, 0x9, 0x1, 0x4, 0x7, 0x7, 0xa3, 0xb16, 0x1, 0x9e, 0x1, 0x4, 0x2, 0x7ff, 0x1a0b, 0x76, 0x8, 0x4, 0x7, 0x4, 0x6, 0xdc, 0xffffffff, 0x4, 0x3, 0x1, 0xbc9, 0x4, 0x6a333c46, 0x40, 0x3, 0x9, 0xad, 0x4, 0x8001, 0x40, 0x6, 0x3f, 0x80, 0x4, 0x8000, 0xa48, 0x3, 0x1, 0x7, 0x557, 0x6, 0x7, 0x2025, 0x7, 0x7, 0x3100, 0x0, 0xfffffffffffffffc, 0x0, 0x6, 0x1, 0x4, 0x1, 0x8, 0x2, 0x0, 0x8000, 0x80000000, 0x6, 0xcf4, 0xffffffffffffff81, 0x810000, 0x0, 0x104cce8, 0x8, 0x4, 0xca, 0x19e8, 0x5, 0x9, 0x2, 0x1, 0x234e5478, 0x401, 0x2, 0x8, 0xffffffffffffffff, 0x8, 0x1000, 0x0, 0x100000000, 0x1ff, 0x6, 0x3, 0x7, 0x100000000, 0x3, 0x1, 0x6, 0x0, 0x6, 0x3, 0x4, 0xc7, 0x2af, 0x7a, 0x9, 0x7, 0x8, 0x400, 0x6, 0xc599, 0xff, 0x0, 0x6, 0x9, 0x0, 0x3, 0x40, 0x80000000, 0x197c, 0x100000000, 0x4d, 0x7, 0xff, 0x20, 0x7, 0x2, 0x0, 0x6, 0x6, 0x87, 0x8, 0x3f, 0x6, 0x5, 0x401, 0x8, 0x700000, 0xfffffffffffffeff, 0x842, 0x7, 0x101, 0x1, 0x7, 0x80, 0xa9, 0x7, 0x9000000000000000, 0xc3, 0x25, 0x7, 0x5404, 0x8, 0x7, 0x401, 0x9, 0x8, 0x5, 0x5, 0x1f, 0x1, 0x2, 0x7, 0x6, 0x2, 0x2, 0x4, 0x40, 0x1, 0x1, 0x0, 0x7fffffff, 0x8, 0x3, 0x4127, 0x9, 0x3, 0x68d80000000, 0x92f8, 0x1, 0x508, 0x2, 0x9, 0x6, 0x77cc, 0x7, 0x400, 0x9, 0x8, 0x800, 0x100000001, 0x9, 0x400, 0x10001, 0x1, 0x9, 0x9, 0x6, 0x2, 0x3, 0x100, 0x2, 0x100, 0x60, 0x800, 0xcc06, 0x1ff, 0x3, 0x9, 0x8, 0x1, 0x3ff, 0x6, 0xf5, 0x81, 0x1, 0x0, 0x5d, 0x10000, 0x80000000, 0x8000, 0x7ff, 0x994, 0x1, 0x8, 0x4, 0xde, 0x1, 0x1, 0x0, 0xb, 0x6, 0xcd1, 0x61, 0x9, 0x80000001, 0x5e5, 0x8, 0x5, 0x2aaaeccc, 0x10002000000, 0x8, 0x100, 0x4, 0xffffffffffffffa4, 0x1, 0x5, 0x40, 0x6, 0x0, 0x0, 0x2, 0x5, 0x3f, 0x3, 0x1f, 0x8234, 0x1, 0x10000, 0x4, 0xe44e, 0x7, 0x9, 0x7, 0x9, 0x5, 0x4, 0x6572, 0x8, 0x6, 0x8, 0x40, 0x3f, 0xc7a, 0x2, 0x19b, 0xdeff, 0x8, 0xfff, 0x9, 0x1, 0x0, 0x9, 0x9, 0x1f, 0x6, 0x5, 0x75b, 0x2, 0x7fffffff, 0x2b, 0x9, 0xfffffffffffffffb, 0x1b, 0x1, 0x0, 0xfa5, 0x80000001, 0x7, 0x5, 0x0, 0x4, 0x0, 0x8000, 0x4, 0x9, 0x55, 0x9, 0x6, 0xcb, 0x20, 0x100, 0x20, 0x100000000, 0x1000, 0x3, 0x3ff, 0x5fcb, 0xe000000000000, 0x7fff, 0x9, 0x20000000000, 0x6, 0x2, 0x7, 0x1000, 0x6, 0xfffffffffffff134, 0x9, 0x164ae0, 0x200, 0x3, 0x10000, 0x6, 0x80000000, 0xfffffffffffffffc, 0x0, 0x3, 0xb, 0x1, 0x5, 0x6, 0x0, 0x4, 0xe8f4390, 0x1, 0x1000, 0xf5, 0x100000001, 0x9, 0x4, 0x200, 0x1000, 0x0, 0x7fff, 0x7, 0x9, 0x0, 0x0, 0x5, 0xb3, 0xffffffff, 0x80000000, 0x70e, 0x1, 0x6, 0x5, 0x4, 0xabf9, 0x6, 0x1, 0x40, 0x7fffffff, 0x0, 0x2, 0x3, 0x9, 0x1, 0x100, 0x5, 0x0, 0x4, 0x10001, 0x20, 0x3, 0x0, 0x8000, 0xfffffffffffffffc, 0x7, 0xcf, 0x7a29, 0xffffffffffffffe1, 0x7fff, 0x4, 0x26cd, 0x8, 0x1, 0x5, 0x7, 0x2, 0x8, 0x6, 0x9, 0x7, 0x101, 0x2, 0x9, 0x4, 0x7, 0xfffffffffffffffa, 0xffff, 0x2, 0x1, 0x4, 0x7, 0x1ff, 0x8, 0x0, 0x72e, 0x7fffffff, 0x8, 0x7, 0x6, 0x7, 0x200, 0x35, 0x80000000, 0x24a2800000000, 0x2, 0x0, 0xfffffffffffffff7, 0xfff, 0x800, 0x9, 0x3, 0x1, 0xa6c9, 0x263, 0x2, 0x5, 0x56a, 0x2, 0x8, 0x2, 0x7fffffff, 0x4, 0x5, 0x1, 0x6, 0x3, 0x1, 0xf8fb, 0x2, 0x4, 0x3, 0x80000001, 0x6, 0x40, 0x9, 0x4, 0x6, 0x7fffffff, 0x20, 0x0, 0x8, 0x4, 0x8, 0x2, 0x5, 0x6, 0xffffffffffffff00, 0x0, 0x9, 0x9, 0x100000001, 0x9, 0xa36a, 0x80000000, 0x8b, 0x6, 0x1, 0x1, 0x80000000, 0x4, 0x3f, 0x3, 0x35bb, 0x4, 0x100000001, 0x8, 0x4, 0xf17, 0x40, 0x4, 0x1, 0x400, 0x80000000, 0x7ff, 0x6c, 0x81, 0xfff, 0xffffffff, 0x10000, 0xf1, 0x8, 0x3, 0xbe9, 0x8001, 0x6, 0x1, 0x6, 0x80, 0xd01, 0x7, 0x7, 0x800, 0xffff, 0xd800, 0x6, 0x94e, 0x6, 0x1ff, 0x7, 0x498a9020, 0x8, 0x8, 0xffff, 0x40, 0x5, 0x814d, 0x1000, 0x9b, 0x902b, 0xfffffffffffffff8, 0x401, 0x3f, 0x74, 0xe1, 0x80000000, 0x1, 0x800, 0xfffffffffffffffb, 0x40, 0x1f, 0xdd, 0xc3d4, 0x0, 0x1f, 0x1, 0x5, 0x800, 0x0, 0x49e0239d, 0x9, 0x7, 0x3, 0x80, 0x7, 0x6, 0x4, 0x7, 0x6, 0x9, 0x10000, 0x254b, 0x1, 0x6, 0x7f, 0x4, 0x8001, 0x400, 0xa0000000000000, 0x8, 0x3e9, 0x7ff, 0x0, 0x449, 0x4, 0xb15, 0x5, 0x7f, 0xfffffffffffffffd, 0x4, 0x9, 0x2, 0x5, 0x9aa, 0x7ff, 0xec, 0x7, 0xebf, 0x0, 0x80000000, 0x5, 0x7f, 0x800, 0x5, 0x9, 0x6, 0xb6, 0x8, 0x9, 0x8000, 0x0, 0x2, 0x100000000, 0x4, 0x8000, 0x3, 0x9, 0x4, 0x9, 0x80000001, 0x200, 0x5, 0x8, 0x6, 0xffffffffffffff01, 0xff80000000000000, 0x81, 0x2, 0x9, 0x8001, 0x8c92, 0x101, 0xfffffffffffffffe, 0x8, 0x4, 0x7f, 0x0, 0x6, 0xb9, 0x2, 0x7, 0x7, 0x1d1e, 0x3, 0x31ec6b7, 0x2, 0x2, 0x31, 0x7, 0x7fff, 0xffffffff, 0x40, 0x100, 0xfffffffffffffffc, 0x1, 0xbee, 0x2, 0x9, 0xfffffffffffffc01, 0xfffffffffffffff9, 0x0, 0x1, 0x7fffffff, 0x4, 0x81, 0x80, 0xfffffffffffff804, 0x6, 0x9, 0x4, 0x5, 0x9, 0x5, 0x20, 0x7fff, 0x40, 0x8, 0xbdf, 0x4d, 0x2, 0x2, 0x81, 0x6, 0x6, 0xbb, 0x7, 0xb72c, 0xffffffffffffffff, 0x100000000, 0x200000000000000, 0x6, 0x6212ed89, 0xea, 0x3, 0x67, 0x80, 0x100000001, 0x6, 0x0, 0x9, 0x0, 0x80, 0x7f, 0x7, 0x3, 0x9, 0x3ff, 0x5, 0x1, 0x3, 0x0, 0x0, 0x6, 0x1, 0x3ff, 0x0, 0x8, 0x3, 0x5, 0x7, 0xfffffffffffffe01, 0x1, 0xffffffff80000000, 0x1f, 0x2, 0xffffffff00000000, 0x0, 0x101, 0x2, 0x6, 0x18, 0x50f, 0x732, 0x1, 0x80, 0x3, 0x7, 0x101, 0x401, 0x50d4, 0x5, 0xffffffffffffffef, 0x200, 0x4, 0x1f40, 0x3, 0x7, 0x401, 0x40, 0xfffffffffffffffc, 0x0, 0x5, 0x7fff, 0x9e94, 0xfffffffffffffffb, 0xf1f, 0x9, 0x5, 0x3327, 0x6285, 0x10000, 0x0, 0x8, 0x3f, 0x8, 0x60, 0x1, 0x6, 0x3, 0x9, 0x4, 0x3, 0xffffffff80000001, 0x100, 0xfffffffffffeffff, 0xffffffff, 0x4, 0x1ff, 0x8000, 0x5523, 0x8, 0x6, 0x100000001, 0x20, 0x1f, 0x8, 0x9, 0xffffffffffffffe1, 0x1, 0xff, 0x4, 0x5, 0x1, 0x2, 0x1411, 0x3ff, 0x6, 0x6, 0x8, 0x3, 0x8, 0xaa8, 0x6, 0x7f, 0x80, 0x0, 0x10001, 0xffff, 0x1, 0x3, 0xffffffffffff0000, 0xfffffffffffffffb, 0x8, 0x3, 0x5, 0x7ff, 0x3142, 0x0, 0x2, 0x40, 0x80000001, 0x7f, 0x8, 0xffffffff, 0x9, 0xd6b, 0x9, 0x6, 0xffffffff, 0x4, 0xfffffffffffffffc, 0xb2, 0x100000001, 0x40, 0x4, 0x400, 0x8, 0x80000001, 0x6, 0x86, 0x9, 0x2, 0xedf, 0x5, 0x9, 0x8000, 0xee, 0x40, 0x2a6, 0x4, 0xfffffffffffff801, 0x10001, 0x6, 0x800, 0x0, 0x4, 0x0, 0x5, 0x40, 0x2, 0x8, 0x1, 0xd20, 0x2, 0x3, 0xfffffffffffffc00, 0x9, 0x8000, 0x2, 0x4, 0x81, 0x3ff, 0x200, 0x1, 0x9, 0x2, 0xfbc5, 0x6, 0x5, 0x3, 0xda19, 0x9, 0x7, 0x40, 0x6, 0xa0000000000, 0x3, 0x4, 0x7fff, 0xbb, 0x9, 0x8001, 0x0, 0x0, 0xffffffffffffff00, 0x2, 0x3, 0x1000, 0x7f8000000, 0x81, 0x1ff, 0x8, 0x7, 0xfffffffffffffff8, 0xd2, 0x8, 0x2, 0x0, 0x5, 0x856, 0x7, 0x6, 0x0, 0x0, 0x3, 0xf8, 0x6, 0x4, 0x3, 0x7, 0x6, 0x1, 0x3, 0x6755, 0x9, 0x81, 0x81, 0x6, 0x9, 0x9, 0x9, 0x7f, 0x9, 0x3, 0x7, 0x81, 0x76, 0x8001, 0x6, 0xe6, 0x3, 0x10000, 0x4, 0x5, 0x7, 0x9, 0xffffffffffffa67f, 0x8, 0x3, 0x2, 0x4, 0x741, 0x93, 0x80000001, 0x100000001, 0x4, 0x6, 0x8, 0x10000, 0x0, 0x9b38, 0x7, 0x5, 0x2, 0x7fff, 0x5, 0x1, 0x3ff, 0x9, 0x0, 0x2d, 0x0, 0x100, 0xbd, 0x1000, 0x8, 0x80, 0x7ec, 0x203, 0x6, 0x9, 0xf58, 0x20, 0x7, 0x80, 0x9, 0x10000, 0x10001, 0x8000, 0x1fe0, 0x2, 0x8, 0x1, 0x3, 0x4, 0xffff, 0x363883bb, 0x401, 0x4, 0x800, 0x8000, 0x5, 0x6, 0x400, 0x1, 0x5, 0xfffffffffffffffa, 0x3, 0x4, 0x6, 0x4, 0x1, 0x5, 0x4, 0xc1a, 0x5, 0x1f, 0xcb1c, 0x4, 0x100, 0x8, 0x7fffffff, 0x100, 0x0, 0x6, 0x7, 0x7fff, 0xbd, 0x3, 0x3f, 0x5966a570, 0x9, 0xb4000000000, 0xffffffff7fffffff, 0x1, 0x1, 0x9, 0x20, 0x5, 0x4f, 0x7, 0x81, 0xfffffffffffeffff, 0x0, 0x1, 0x8, 0x0, 0x3ff, 0xd8e0, 0x7ff, 0x100, 0x100000001, 0x10000, 0xa6f, 0xfff, 0x5, 0x92f, 0x1, 0x57df, 0x2, 0x0, 0x400, 0x1, 0x7, 0x10000, 0x1f, 0x4, 0x200000002, 0x0, 0x7fffffff, 0x0, 0x81, 0x5, 0x100000000, 0x1f, 0x0, 0x8, 0x2, 0x5, 0x401, 0xffffffff, 0x0, 0x21, 0x2, 0x4, 0x100000000, 0x6, 0x5659, 0x5, 0x100000000, 0x4, 0x67, 0x1, 0x6, 0xe79, 0x1, 0x5, 0x3, 0x1, 0x3, 0x9343, 0x8, 0xed9, 0x9, 0xbfaf, 0x80, 0x8, 0x0, 0x3f, 0xf6, 0x2, 0x5, 0x6a028620, 0xff, 0x6, 0x7f, 0x0, 0x7, 0x5, 0x2, 0x800, 0x6000, 0x2, 0x8001, 0x7, 0x10001, 0x2, 0x8001, 0x0, 0x5, 0x3, 0x1, 0x8, 0x4, 0x9, 0x400, 0x1ff, 0x3, 0x5, 0x1, 0x0, 0x28, 0x80000001, 0x1004000000000, 0xfff, 0x101, 0x0, 0x100000000, 0x400, 0x6, 0x6, 0x48f9, 0xffffffffffffff00, 0x19c0, 0x9, 0x6, 0xd1d, 0x8, 0x8001, 0xce6d, 0x9, 0x0, 0x0, 0x8001, 0x0, 0xfd1, 0x8, 0xbe5f, 0x3, 0x0, 0x8, 0x8, 0x3, 0x3, 0x4, 0x4, 0x50458859, 0x1ff, 0x0, 0x7ff, 0x1, 0x8001, 0x3f, 0x0, 0x5f00, 0x80, 0x6, 0x80, 0x8000, 0x1, 0x0, 0x2, 0x3, 0x19b6, 0xf35, 0x4, 0x5, 0x2, 0x40, 0xbc, 0x8f, 0x2, 0x3, 0xf3b, 0x8, 0x4, 0xfffffffffffffff7, 0x79, 0x8001, 0x0, 0x80000001, 0x20, 0x3, 0x4, 0xb7c5, 0xffffffffffffffff, 0x9, 0xcc34, 0x7, 0x4, 0x8, 0x7, 0x14b700000000, 0x80000001, 0x8, 0x40, 0x20, 0x3, 0x1, 0x3, 0x3ff, 0xffffffffffffff80, 0xcb1a, 0x60f, 0x7, 0x3, 0x4, 0xee, 0x1, 0x4, 0x5, 0x1d1, 0x9, 0x9, 0x7ff, 0x7, 0x8, 0x8, 0x3, 0x6f9, 0x765, 0x40, 0x8, 0xde34, 0x3, 0x6, 0x80000000, 0xff, 0xfffffffffffffff8, 0x0, 0x8, 0x1, 0x9, 0x100000000, 0x8, 0x4, 0x2, 0x7ff, 0x1860, 0x1c00000000000, 0x1, 0x3ff, 0x1, 0x2, 0x101, 0x80000001, 0x8, 0x541, 0x5, 0x4, 0x6, 0x8e, 0x9, 0x3, 0x7, 0x20, 0xfffffffffffffffa, 0x8, 0x8000, 0xd3ef, 0x6, 0x0, 0x5, 0x7fffffff, 0xffffffffffffff80, 0x401, 0x7f640a56, 0x7a0, 0xb8, 0x21a, 0x80, 0xa2c, 0x9, 0x8, 0x3, 0x8, 0x0, 0xaa, 0x0, 0x5, 0x6, 0x10001, 0xffffffffffffffff, 0xfffffffffffffffd, 0x9, 0x4, 0x10aa895e, 0x80, 0x2ae, 0x7, 0x5, 0x7, 0xfffffffffffffff7, 0x3051, 0x200, 0x1, 0x598, 0x3, 0x7, 0x1, 0x7fffffff, 0x3, 0x2, 0x1, 0x4, 0x6, 0x7fffffff, 0x5, 0x2, 0x8001, 0x2, 0x100, 0x101, 0x45ae861a, 0x1, 0x8a, 0x80000001, 0x7, 0x7, 0x7, 0x2, 0xfffffffffffffffd, 0xffff, 0x200, 0x5, 0x794, 0x0, 0x6, 0x4, 0x2, 0x4e8e9905, 0x7bd0, 0x3, 0x5, 0x10001, 0x7fff, 0xfffffffffffff000, 0x1, 0x7ff, 0x8001, 0x4000000000, 0x6aa5, 0x80000000, 0x1c0, 0x9, 0x7f, 0x0, 0x8000, 0x7, 0x7, 0x400, 0x2, 0x0, 0x7, 0x5, 0x100, 0x8000, 0x1, 0xfffffffffffffffc, 0x200, 0x8, 0x3, 0x6, 0xfff, 0x3ff, 0xae3, 0x1ff, 0xfffffffffffffff7, 0x358a, 0x4429, 0x8, 0x7, 0x6, 0x0, 0x6, 0x8, 0xffff, 0x6, 0x18, 0x8000, 0x7fff, 0x7, 0x1, 0x4, 0x3, 0xffffffffffffdf43, 0x10000, 0x5, 0x0, 0x3, 0x80, 0x3, 0x6, 0x8000000, 0x1, 0x6, 0x644, 0x2, 0xff, 0x0, 0x10001, 0x8, 0x2, 0x0, 0x8, 0x6, 0x1ff, 0x0, 0xfffffffffffffff8, 0x0, 0x200, 0x0, 0x6, 0x6, 0x0, 0x0, 0x7ff, 0x4, 0x8, 0x400, 0x6, 0x6, 0x7f, 0x91, 0x10000, 0x200, 0x8, 0x80, 0x7ff, 0x7f, 0x3, 0x6, 0xdabf, 0x81, 0x9, 0x4, 0x100000000, 0x5, 0x200000000, 0x10000, 0x6, 0x9, 0x8, 0x10001, 0x80, 0x600000000000, 0x89, 0xff, 0x4, 0x503, 0x100000001, 0x100000000, 0xdef, 0x6, 0x3, 0x5, 0x3, 0x1, 0x101, 0x3, 0x80000000, 0x100000001, 0x3, 0x0, 0x1ee, 0x3, 0x4, 0x9, 0x47, 0x9, 0x515e, 0x9, 0x8, 0x400, 0x1000, 0xc2, 0x6, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffb, 0x800, 0x100000000, 0x8000, 0x5, 0xfff, 0x20, 0x4, 0x9, 0x1e4, 0x3, 0x9dc, 0x20, 0x9, 0x100, 0x4, 0x4, 0x5, 0x5, 0x5, 0x8, 0x9, 0x3, 0xfffffffffffffffc, 0x1, 0x8, 0x6, 0x5539, 0x7, 0x5, 0x2, 0x4, 0x0, 0x4, 0x5, 0x6, 0x2f5d, 0x8001, 0xe6, 0x3, 0x7, 0x3ff, 0x40, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x5, 0x9, 0x6, 0x9, 0x7, 0x0, 0x7, 0x9, 0x7a68, 0x5, 0x4, 0x4, 0x3, 0x0, 0x4000, 0x9, 0x0, 0x3, 0xbc, 0x0, 0x4112, 0x5, 0x9, 0x400, 0x9, 0xffffffffffffffc0, 0x1000, 0x1, 0xce8f1f6, 0x0, 0x5, 0xffffffff, 0xfff, 0x9, 0x7f, 0x9, 0x3, 0x8, 0xff, 0x401, 0x7ce1, 0x6, 0x1, 0x9, 0x7, 0xffff, 0x7, 0x20, 0x0, 0x40, 0x7fff, 0xffff, 0x32, 0x15ce9fe3, 0x7, 0x588, 0x3f, 0x200, 0x401, 0xffffffff00000001, 0x1, 0x760c99dd, 0x2, 0x2, 0x100, 0x8, 0x3, 0x0, 0x20, 0x7fffffff, 0x1000, 0x8, 0x8, 0x401, 0x7, 0x0, 0x1, 0x0, 0x1, 0xffff, 0x4f, 0x8, 0x8, 0x5, 0x3535, 0x7ff, 0x101, 0xbfb2, 0x5, 0x8, 0x6, 0x32, 0x5, 0x9021, 0xfffffffffffffff9, 0xff, 0xbe, 0x9249, 0x7fff, 0x6, 0x7, 0x3ff, 0x5, 0x100000000, 0x45, 0x8, 0x80000000, 0x400, 0x2f, 0x7ff, 0xffffffff, 0xfffffffffffffc00, 0x200, 0x8, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0xa18, 0xfffffffffffffff7, 0xf37, 0x2, 0xfffffffffffffffb, 0xdd8, 0x40, 0x4, 0x4b, 0x8, 0xfffffffffffffffe, 0x1, 0x2d, 0x38e1, 0x20, 0x2, 0x8, 0x3, 0xffffffff, 0x9, 0x101, 0x0, 0x87, 0x7, 0x101, 0x9, 0x6, 0x1, 0x100000000, 0x7, 0x101, 0x8001, 0x3, 0xa3, 0x6, 0x40, 0xfffffffffffffffa, 0x6ea, 0x0, 0x2, 0x0, 0x3, 0x7f, 0x3, 0x2, 0xb74e, 0x6, 0x0, 0x2, 0x3f, 0x180000000000000, 0x0, 0x4, 0xffffffffffffffff, 0x5, 0x6, 0x8001, 0x1, 0x9, 0x8, 0x0, 0x8, 0x6, 0x20, 0x2, 0x4, 0xfffffffffffffffc, 0x3, 0x93d500000, 0x2, 0x1ff, 0x2, 0x5, 0xfffffffffffffff8, 0x10001, 0x6, 0xff, 0xecd, 0x5, 0x5, 0x4, 0x80000000, 0xf7eb, 0x2, 0x52b, 0x8504, 0x1, 0x7f, 0x86c4, 0x1, 0x1, 0x9, 0x8, 0x2d46, 0x81, 0x33, 0x3, 0xff, 0x2, 0x8ff, 0x8, 0x3, 0x9, 0x1, 0x9, 0x149b, 0x2, 0x80000000, 0xc21, 0xaa, 0x8, 0x320d, 0x7fff, 0x3, 0x9, 0x2, 0x3, 0x0, 0x57, 0x9, 0x7, 0xfffffffffffffff8, 0x2, 0x8, 0x9, 0x2, 0x9, 0x9, 0x7, 0x9, 0x4, 0x10000, 0x4, 0x6, 0x6, 0xffffffffffffe8fc, 0x1, 0x4, 0xffffffffffffffff, 0x100, 0x9539, 0x3f, 0x7, 0x2, 0x80, 0x0, 0x9, 0x0, 0x4, 0x9, 0x4, 0x4, 0x80000000, 0x2, 0x9, 0xffffffff, 0x81, 0x9, 0x8, 0x5, 0x9, 0x75, 0x3, 0x20, 0x8000, 0x4, 0x100, 0x2, 0xa000000, 0x10001, 0x7, 0x1, 0x100000000, 0x6, 0x0, 0x4c, 0x4, 0x704, 0xffff, 0x0, 0x8000, 0x9, 0x4, 0x6, 0x1, 0x3, 0x100, 0x0, 0x80000000, 0x2, 0x1, 0x7f, 0x2, 0xfffffffffffffff9, 0xffffffff, 0x2, 0x80000001, 0x8, 0x480d8258, 0xffffffffffffffe0, 0x8, 0x6, 0x5, 0x8, 0x2, 0x92, 0x9, 0x7, 0x1, 0x4, 0xffffffffffffff02, 0x100, 0x7ff, 0x5, 0x401, 0x0, 0x5, 0x3, 0x2, 0x7, 0x7, 0x4ace, 0xfffffffffffffffc, 0xfffffffffffffff9, 0xffffffffffffffa7, 0xffff, 0x0, 0xcd5, 0x40000000000000, 0x8, 0xdac1, 0x7ff, 0x0, 0x6, 0x200, 0x5, 0x4, 0x1, 0x0, 0x1ff, 0x9, 0x6, 0x4, 0x9, 0x80000000, 0x6, 0x3, 0x800, 0x1, 0x3, 0x5c, 0xfffffffffffffffb, 0x0, 0x10000, 0x19b5, 0x9, 0x1, 0xa6, 0x101, 0x10001, 0x8, 0xf79, 0x5, 0x401, 0x4, 0x401, 0x808000000000000, 0x5, 0x800, 0x7, 0x3, 0x100, 0x0, 0x1ff, 0x3, 0xef8, 0x0, 0x815, 0x1f, 0x7, 0x8, 0x10001, 0x1, 0x0, 0x0, 0x2, 0x7ff, 0x6, 0x2, 0x1, 0x5, 0x400, 0xfffffffffffff4d8, 0x9, 0x9, 0x1, 0x0, 0x7fff, 0x80000001, 0x0, 0x0, 0x8001, 0x4, 0x5, 0x978, 0x0, 0x7, 0x3f, 0xfffffffffffffffa, 0xc9, 0x7fff, 0x3, 0x0, 0x9, 0x4, 0x3, 0x1, 0x1, 0x4, 0x10000, 0xfff, 0x5, 0x40, 0x5, 0x6, 0xffff, 0x4, 0x81, 0x5, 0x563, 0x5, 0x3f, 0x5, 0x0, 0x4, 0x5, 0x1, 0xfffffffff208df47, 0x8, 0x7, 0x1, 0x12000000, 0xe28, 0x0, 0xfffffffffffffffe, 0x9, 0xcbb2, 0x1, 0x4, 0x4, 0x475ad481, 0x7, 0x0, 0x7, 0x8, 0x34b, 0x768, 0x3, 0x10001, 0x4, 0x7, 0x2, 0x2, 0x1, 0x8000, 0x9, 0xfffffffffffffffa, 0x3, 0xa0d1, 0x7, 0x7fffffff, 0x1, 0x4, 0x8, 0xde, 0x9, 0x5, 0xc7, 0x6, 0x1, 0x3, 0x1ff, 0x58d, 0x9, 0x4, 0x4, 0x5, 0x8, 0x9, 0xb0, 0x2, 0x20, 0x0, 0x5, 0x36f8, 0x80, 0x4, 0x0, 0x5a1, 0x401, 0xffffffff, 0x3, 0xfffffffffffff800, 0x81, 0x8, 0x1, 0x3, 0xfff, 0x2, 0x1, 0x4000000000000000, 0x7fffffff, 0x630b, 0xfffffffffffffff9, 0x65, 0x5, 0x8, 0x100000001, 0xfffffffffffffffd, 0x9, 0x401, 0x6, 0x6, 0x7, 0x5, 0x1, 0xffffffffffffffe2, 0x2, 0x0, 0x8, 0x7a76, 0x9, 0x4, 0xff, 0xfffffffffffffffb, 0x56, 0x3, 0x6ccf1bb0, 0x7, 0x81, 0x7, 0x0, 0xffff, 0x6, 0x1, 0xbbb5, 0x2, 0xcf1e, 0x2, 0x10000, 0xffffffffffffffff, 0x3, 0xfffffffffffffffe, 0xfffffffffffffffc, 0xfd9e, 0x20, 0xfffffffffffffffa, 0x20, 0x200, 0x8, 0x9, 0xfffffffffffffffe, 0x1, 0x4, 0xffff, 0x39dc, 0x1, 0x6, 0x9, 0xb50, 0x0, 0x10001, 0x2, 0x1000, 0xffff, 0x20, 0x5, 0x5, 0xef4, 0x3, 0x9, 0x6, 0x85b, 0x1, 0x6fbf60b1, 0x2, 0xfffffffffffffff9, 0x7fff, 0x3ff, 0x7, 0x2, 0x401, 0x39e, 0x6, 0x5, 0x8001, 0x9, 0x6, 0x5, 0x40, 0x5, 0x0, 0x7, 0x1, 0xd76a, 0x60000000000000, 0x2, 0x512, 0x2, 0x1, 0x101, 0xc06, 0xfffffffffffffba7, 0x1, 0x8, 0x2, 0x3ff, 0x10001, 0x100, 0x100000001, 0x0, 0x2, 0x1ff, 0x7, 0x6, 0x6, 0xfffffffffffffffc, 0x9, 0x0, 0xa18, 0x1, 0x6, 0x890, 0x8, 0x74e5, 0xa0, 0x3ff2, 0x8, 0x6, 0x3, 0x2, 0x400, 0x350b0790, 0x2, 0x3, 0x800, 0x3, 0x1, 0x80, 0x0, 0x2, 0x8, 0x81, 0xffffffff, 0x800, 0x7, 0x7, 0x7, 0x1, 0x80000000, 0x7f, 0xa552, 0x1f, 0x389, 0xfffffffffffffffc, 0xd88, 0x25a3, 0x30, 0x4, 0x1, 0x1c, 0xffffffffffffd2b8, 0x0, 0xffff, 0x6, 0x1f, 0x3, 0x5, 0x3f0, 0x1ff, 0x90000, 0x2, 0x8, 0x2, 0x4c8, 0x2, 0x2, 0x8000, 0x9694, 0x4, 0x80000001, 0x7, 0x800, 0x2, 0x3, 0x2982, 0x3ff, 0x3, 0x4, 0xfff, 0xffffffff, 0x1, 0x4, 0x20, 0x9, 0x3, 0x1, 0x2b, 0x100000001, 0x20, 0x2, 0x48a1, 0x8000, 0x3f, 0x8, 0x0, 0x7fffffff, 0x7, 0x2, 0x400, 0x6542f1f4, 0x5, 0x100, 0x8, 0x3, 0x0, 0x8426, 0x7, 0x3f, 0x400, 0x5, 0x8, 0xdb2f, 0x7, 0x415f, 0x7, 0x401, 0x6, 0xfab, 0x80a, 0x6, 0x8, 0x8, 0x7f, 0x8000, 0x7ff, 0x9, 0x9, 0xfffffffffffffffb, 0x10000, 0x9, 0x3, 0xfffffffffffffffe, 0x8, 0x8, 0x401, 0x9, 0xd4, 0x0, 0x8000, 0x5, 0x10000, 0x4404fc90, 0x6, 0x800, 0x9, 0x20, 0x100000000, 0x0, 0x6, 0xfffffffffffffff7, 0x10001, 0x0, 0x4, 0x5, 0x6, 0x9, 0x1000, 0x3, 0xcff, 0x1, 0x7, 0x96, 0x100000000, 0x3ff, 0x4, 0x3, 0x5, 0x11, 0x1, 0x9, 0x5, 0x80, 0x19, 0x7, 0x9, 0x10000, 0xffffffffffffffff, 0x922, 0x81, 0x4, 0x4, 0x2, 0x4, 0x1, 0x308, 0x6f9, 0x4, 0x4f3, 0x1, 0x5, 0x2, 0x6358563c, 0x80000001, 0x4, 0x42b1eb8a, 0x8, 0x6, 0x5490, 0x8, 0x2000, 0x7ff, 0x4, 0x1f, 0x2, 0x80, 0x3, 0x9, 0x3, 0x5, 0x7, 0x5, 0x3ff, 0xfffffffffffffff7, 0x5, 0x5, 0x9, 0x1ff, 0xb9, 0xfffffffffffffff8, 0x100000000, 0x3, 0xffff, 0x7fffffff, 0x1000, 0x3f, 0x3, 0x81, 0x0, 0x6, 0x400, 0x3, 0x1ff, 0x5, 0x100000000, 0x4, 0x40, 0x906, 0x1, 0xfff, 0x5, 0x10001, 0x5, 0xffffffff, 0x45, 0xdaf, 0x100000000, 0x6, 0x0, 0x229, 0x80, 0x0, 0x2c37, 0x3, 0x8, 0x6, 0xff, 0x401, 0xff, 0x0, 0x2, 0x7, 0xfffffffffffffff9, 0x30, 0x8, 0x0, 0x8a95, 0x3, 0xffff, 0x1f, 0x1, 0x8001, 0x5, 0x0, 0x9b20, 0x100000000, 0x21, 0x4, 0x100000001, 0xa, 0x0, 0x9, 0x3fffffff8000000, 0x45c0, 0xfffffffffffffffb, 0x4, 0xc1f, 0x1, 0x10000, 0x1f, 0x1, 0xfffffffffffffffa, 0x7fff, 0xffffffffffffff01, 0x5, 0x9, 0x7fffffff, 0x100, 0x100000000, 0x1, 0x7fffffff, 0x5, 0x6, 0x9, 0x3ff, 0x1, 0x0, 0x80, 0x2, 0x1000, 0x7fffffff, 0x0, 0x3, 0x3, 0x8, 0xfdc, 0xd6, 0x1ff, 0x7, 0x1, 0x2, 0xe680, 0xfffffffffffffbff, 0x45a5, 0x3, 0x7, 0x0, 0x8, 0x2, 0x9, 0x3ff, 0x1000, 0x5, 0x7f, 0x9, 0x80000001, 0x10000, 0xffffffffffffffc0, 0xccf1, 0xfffffffffffffffe, 0x2, 0x4, 0x0, 0x101000000000, 0x5, 0x3, 0x5d09, 0xac, 0x6, 0x2, 0x3f, 0x9, 0x81, 0x8000, 0xd0, 0x80, 0x3, 0x3f, 0x1, 0x1ff8000000000, 0xfff, 0x0, 0x3f, 0xffffffff, 0x0, 0x6, 0x0, 0x8000, 0xfcd9ef5, 0x8, 0x8001, 0x3f, 0x9, 0x8, 0x5, 0x1447, 0x2, 0x26, 0x6, 0x10001, 0xff, 0x6, 0xf3, 0x0, 0x8000000100000000, 0xacd, 0x1f, 0xa1, 0x2, 0x0, 0x1, 0x1, 0x7f, 0x6, 0x8000, 0x3f, 0x9, 0x9, 0x6, 0x5c3, 0x1, 0x81, 0x7fffffff, 0x46, 0x2, 0x8, 0x1ff, 0x80000001, 0x8000, 0x950, 0xfffffffffffffffa, 0x1000, 0xc000000000000000, 0x1000, 0x7fffffff, 0x3, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0x1000, 0x2, 0x1, 0x100000001, 0x100, 0x7fffffff, 0x8, 0x3, 0x3, 0x9, 0x8, 0x3, 0x1, 0x10001, 0x4, 0x9, 0x5, 0x0, 0x5, 0x401, 0x100000001, 0x4, 0x1add, 0x0, 0x4, 0x80, 0x3, 0x71, 0x8, 0xfffffffffffffffd, 0x5, 0x9, 0x0, 0x9, 0x8, 0x80000001, 0x9, 0x0, 0x9, 0x269, 0x4, 0x7ff, 0x0, 0x8, 0x6c29, 0x7, 0x3, 0x100000001, 0x2, 0x5, 0x5, 0x542, 0x1, 0x1, 0x8, 0x2b, 0x7, 0x8, 0x80000000, 0x80000001, 0xf61, 0x9, 0x885, 0x20200, 0x2, 0x1, 0x9, 0x3, 0x3, 0x3, 0x7, 0xa9, 0x8000, 0x80000000, 0x6, 0x4, 0x2, 0x42f4, 0x4, 0x8c5, 0x7f, 0x1, 0xfffffffffffffff8, 0x2, 0x8, 0x5, 0x4f, 0x401, 0x7, 0x7f, 0x1, 0x9, 0x100000000, 0x0, 0x3, 0x4de, 0x8, 0x2000000, 0x8001, 0x80000001, 0x1, 0x1ff, 0xffffffff, 0x9e62, 0x9, 0x4, 0x7, 0x800, 0x26, 0xe4, 0x7, 0xffff, 0x5, 0x3f, 0x10001, 0x1, 0x3ff, 0x7, 0x1ff, 0x20, 0x100000001, 0x6, 0x9, 0x101, 0x2, 0xff, 0x6, 0x0, 0x4, 0x8, 0x0, 0x5, 0x3, 0x4ef, 0x1, 0x0, 0x8, 0x3, 0x8, 0x6, 0x3, 0x9, 0x5, 0x3, 0x7, 0x80000001, 0x5, 0x40ec, 0x20, 0x81, 0x3, 0x1f, 0x6, 0x1, 0xc11, 0x9, 0x9, 0x1, 0x8, 0x5, 0x20, 0x10000, 0x6, 0x2, 0xfb2, 0x8, 0x40, 0x6, 0x1, 0x7, 0x7fff, 0x7, 0xfffffffffffffffb, 0x6, 0x6, 0x4, 0x5, 0x6, 0x75aa4ef9, 0x8, 0x1, 0x9, 0xffff, 0x10000, 0x5665, 0x1000, 0x3, 0xfff, 0x8, 0x7, 0x8, 0x200, 0x7, 0x8, 0x78, 0xffffffff, 0x6, 0x1, 0xffffffffffff5003, 0x6, 0x3, 0x5, 0x6, 0x100, 0x100000001, 0x7fff, 0x7, 0x7f, 0x4, 0x2, 0x9, 0x9, 0x6, 0x8000, 0x1, 0xffffffff, 0xff, 0x77, 0x2, 0x69, 0x3ff, 0x1, 0x6c, 0x8, 0xdb, 0xb1, 0x1, 0x80, 0xfffffffffffff001, 0x5, 0x3, 0x0, 0x5, 0x4, 0x7ff, 0x100000001, 0x800, 0x80000001, 0x9, 0x401, 0x2, 0x10001, 0xfffffffffffffff8, 0x81, 0x8, 0xffffff0000000000, 0x7, 0x0, 0x0, 0x8bb, 0x2, 0xf207, 0x86, 0x200, 0x80000001, 0x3, 0x1, 0xea51, 0xfffffffffffffff8, 0x3ff, 0x7f, 0xfffffffffffffffa, 0x20, 0x8, 0xc3, 0x3, 0x0, 0x7fffffff, 0x7ff, 0x7e, 0x1, 0x7, 0x3de4, 0x80000001, 0xffffffffffff8000, 0x3, 0xfffffffffffffffc, 0x528, 0x0, 0x6563, 0x8, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x0, 0x5, 0x4, 0x2, 0x6, 0x9, 0x10000, 0x1, 0x6, 0x7, 0xde, 0x9f, 0x0, 0x8, 0x1ff, 0x0, 0xba, 0x8, 0xfffffffffffff001, 0xfba, 0x400, 0xcb9, 0x7, 0x2, 0x2, 0x6, 0x84, 0x80000000, 0x9c, 0x5c52, 0x80000000, 0x5, 0x7, 0x0, 0x0, 0x7, 0x8, 0x2, 0xfffffffffffffff9, 0x4, 0x45, 0x6, 0x10000, 0x7b, 0x0, 0x1f, 0x9, 0x1, 0x0, 0xffffffffffffffff, 0x3ff, 0x4, 0x85cb, 0x62ef, 0x5, 0x241, 0x400, 0x8, 0x1f, 0x9f3d, 0x8, 0x80000001, 0x2, 0x7fff, 0x24d, 0x3, 0x2, 0x2, 0x101, 0x10001, 0x3, 0x8, 0x80000000, 0x5, 0x1000, 0x8001, 0xfff, 0x972, 0xa15, 0x7f, 0x7, 0x7fff, 0x9, 0x6, 0x3f, 0x8cb5, 0x9d4, 0x8, 0xfffffffffffffffe, 0x1ff, 0xfff, 0x3ff, 0x7, 0x81, 0x6, 0x7ff, 0x6, 0x9, 0x4, 0x0, 0xfffffffffffffffe, 0x7, 0x4, 0x8, 0x8, 0x2, 0x81, 0x40, 0x3f3d, 0xffffffff818fc76a, 0xbabe, 0x6, 0x4, 0x1, 0x1, 0x4, 0x100000000, 0xf3e, 0xffffffff, 0x9, 0xff, 0xfff, 0x38f3, 0x8c, 0x401, 0xc28, 0x5, 0xe47, 0x8000000, 0x8, 0x8, 0x81, 0x100, 0x9, 0x6, 0xff, 0x9, 0x13, 0x90, 0x3, 0x7f, 0x8, 0x101, 0x8, 0x7fff, 0xce, 0x31, 0x8, 0x2, 0xd11, 0x2, 0x4, 0x4, 0x1f, 0x0, 0x6, 0x9, 0x3ff, 0xef, 0x0, 0x3, 0x8, 0x3, 0x9d1, 0x4, 0x8, 0x7, 0x3f, 0x6, 0x100, 0x909, 0x1, 0x10000, 0x8, 0x6, 0x1, 0x100, 0x3, 0x3, 0x8f74, 0x5, 0x101, 0x3, 0x9, 0x64f6, 0x2, 0x1, 0x400, 0x7, 0x6, 0x12, 0x8, 0x9, 0x0, 0x5, 0x800, 0x2, 0x9c, 0xffffffff00000001, 0x6, 0x3, 0x2, 0x176b, 0x0, 0xe00000000, 0xe8, 0x9, 0x3, 0xff, 0x40, 0x7, 0x0, 0x3ff, 0x7, 0x0, 0x3, 0xffffffffffff8000, 0x2, 0xfffffffffffff801, 0x4, 0x3, 0x19, 0x9, 0xafc7, 0xe37, 0x9, 0x7fffffff, 0x7f, 0x80, 0x1, 0x3, 0x6, 0x7, 0x1000, 0x7f, 0x9, 0xee, 0x0, 0x400, 0x7, 0x3, 0x80000001, 0xfffffffffffffffd, 0x9, 0x3761000000000, 0x1000, 0x800, 0x6, 0x5, 0x2, 0x9, 0x5, 0x3ff, 0x0, 0x6, 0x87, 0x8, 0xf3, 0x3, 0x200, 0x1, 0x80000001, 0x8, 0x2, 0x1, 0x200, 0x8, 0xff, 0x7f, 0xfffffffffffffffa, 0xcbed, 0x4, 0xc4, 0x2, 0x100, 0x9d, 0x7, 0x101, 0x1f, 0x4, 0x9, 0x8, 0x800, 0x5, 0xffffffff, 0x1, 0x1, 0x2, 0x2, 0x0, 0x7f, 0x1f, 0x31b, 0x7f, 0x0, 0x3, 0x1, 0x6, 0x81, 0x200, 0xfffffffffffffff9, 0x1, 0xfffffffffffffff9, 0x1, 0x100, 0x5cc, 0xbc8e, 0xffffffffffffffff, 0x40, 0x100000001, 0x10001, 0x7ff, 0x0, 0x7, 0xffffffff80000000, 0xe99, 0x5, 0x5, 0x1000, 0xa0, 0xb72, 0x100000001, 0x18, 0x9, 0x3, 0x1000, 0x240000000, 0x43, 0x8, 0xfa, 0x2, 0xd7, 0x1, 0x4, 0x4, 0x1, 0xffff, 0x3f, 0x7f, 0x3, 0x5, 0x8, 0x5, 0x8, 0x7fffffff, 0x5, 0x101, 0x7, 0x3, 0x7ff, 0x8, 0x2, 0xfff, 0x74, 0x0, 0x0, 0x60ce, 0xff, 0x101, 0x6, 0x80000001, 0x566, 0x6, 0x3, 0x8001, 0x1, 0x7, 0x0, 0x400, 0x7, 0xc4bc, 0xffffffffffffff55, 0x1, 0x0, 0x9, 0x9, 0xf0f, 0xde, 0x7ff, 0x9, 0x100, 0x4, 0x6, 0x1, 0x8, 0x5, 0x7, 0x9, 0x80000001, 0x8, 0x100000000, 0x8, 0x7, 0x1, 0xe8d, 0x5516a56, 0x7, 0x6, 0xffffffffffffff75, 0x401, 0x1ff, 0x6, 0x100000001, 0x6, 0x0, 0xce33, 0x0, 0x1, 0xad8, 0x401, 0xd1d0, 0x0, 0x1400000, 0x3, 0x2, 0x0, 0x7, 0x4, 0xffffffffffffffff, 0x7, 0x1, 0x48b12f6d, 0x3, 0x3, 0x3, 0x8, 0xffffffffffffffe1, 0x9, 0x5, 0x16e, 0x400, 0x4, 0x7f, 0xffffffffffffff7f, 0x800, 0x1, 0x1, 0xac9, 0x9, 0x0, 0xff, 0x0, 0xe83, 0x8, 0x7, 0x6, 0x3, 0x6, 0x1f, 0x1000, 0x7ff, 0x7, 0x6, 0x0, 0x1, 0x58aa, 0x0, 0x3f, 0xfff, 0xfffffffffffffffe, 0x3, 0x9, 0x506af7ad, 0x7c0000000000, 0x100000000, 0x9, 0x5b47, 0x7, 0xff, 0x3, 0x7, 0x7ff, 0x401, 0x200, 0xffff, 0x5, 0x100, 0x3, 0x75c, 0x9, 0x3, 0x7, 0xb5, 0xffff, 0x4, 0x64f, 0x8, 0x1, 0x7, 0x100000001, 0x9, 0x7, 0x4, 0x2, 0xabb, 0x1, 0x4926, 0x8, 0x1, 0x7, 0x6, 0xea6, 0x5, 0x1, 0x5, 0x100000001, 0x2, 0x8001, 0xffffffffffff8000, 0x6, 0xe1d1, 0x5d, 0x3, 0x57c3, 0x1, 0x8, 0xffffffffffffb385, 0x10000, 0x8000, 0x0, 0x200, 0x7, 0x60000000, 0x83e, 0x5, 0x401, 0x7ff, 0xfffffffffffffff9, 0x100, 0xb34, 0x5, 0x3ff, 0x3ff, 0x1, 0x0, 0x3, 0x4, 0x7fff, 0x0, 0x200, 0x8, 0x1, 0x800000000000, 0x67dc, 0x3, 0xb9, 0x1, 0x8, 0x9, 0x100, 0x0, 0x7, 0x4, 0x1ff, 0x9, 0x1ff, 0x2, 0x10001, 0x3f, 0x7f, 0x3, 0x4, 0x0, 0x0, 0x3ff, 0x5, 0x2, 0x7c42, 0x36d, 0x101, 0x3, 0xa6000000000, 0x8, 0x2, 0x1000, 0x1, 0x8000, 0x401, 0x7, 0x2, 0x7, 0x3ff000000000000, 0xfffffffffffffff9, 0x40, 0xffffffff, 0x200, 0x7fffffff, 0x3f, 0x0, 0x5, 0xff, 0x401, 0x6, 0x5, 0x3, 0x1, 0x4, 0x4, 0x0, 0x0, 0x7, 0x101, 0xb6ad, 0x9, 0x7, 0x6, 0xfff, 0x6, 0x0, 0xa5d, 0x0, 0xd8a, 0x3, 0x100, 0x7, 0x5b0, 0x20d, 0x12, 0x4, 0x80, 0x3, 0x4e, 0x7, 0x4, 0x4, 0x2, 0x4, 0x9, 0xec, 0x1ffc00000, 0x3, 0x32b, 0x341f, 0xfffffffffffffffc, 0x0, 0x1, 0x8000, 0x9, 0x40, 0x3, 0x3, 0x9, 0x4, 0x7, 0x5, 0x5, 0x8, 0x8, 0x963, 0x7, 0x7, 0x401, 0x2, 0x9, 0x962, 0x46, 0x7, 0x9c, 0xdb7a, 0x2, 0x8, 0x1, 0x5, 0x2, 0x80000000, 0x1, 0xfff, 0x7, 0x2000400000, 0x7, 0x1, 0x7, 0x40, 0x0, 0x10001, 0x85, 0x8, 0x8000, 0x8000, 0xff, 0x4, 0x6, 0x3f, 0x2, 0x7, 0x1ff, 0x5, 0x16f, 0x3c0, 0x4, 0x6c74, 0x7fffffff, 0x1, 0xefe, 0x1, 0x6000000, 0x5, 0x2, 0x80000001, 0x9, 0x5a, 0xfff, 0x6ce, 0x0, 0xffffffffffffffff, 0xff, 0x8, 0x6, 0x0, 0x4, 0x10001, 0x3, 0xffffffff80000000, 0x8, 0x1, 0x9, 0x1, 0xbf9, 0x0, 0x3, 0x7, 0x8, 0xfffffffffffffff7, 0x4c4e, 0x200, 0x10000000000, 0x9, 0x3ff, 0x400, 0x9, 0x724, 0xfffffffeffffffff, 0x80, 0x100, 0x9, 0x100000001, 0x6, 0x81, 0x9b, 0xa7, 0x10001, 0xf, 0x9, 0x1, 0x2, 0xfff, 0x800, 0x5, 0x10001, 0x3, 0x2, 0x5, 0x40, 0x80, 0x2, 0xffff, 0x8, 0xfffffffffffff557, 0xb91f, 0x3ff, 0x3, 0x7fff, 0x1ff, 0x10001, 0x200, 0x3, 0x9bdd, 0x9, 0xffff, 0x400, 0x10000, 0x3, 0x1c0, 0x6, 0x8, 0x7f, 0x5, 0x1f20, 0x9fcf, 0x10001, 0x3, 0x8, 0xff, 0x401, 0x7ff, 0x42, 0x1000, 0x1, 0x1, 0x5, 0xfffffffffffffff9, 0x584, 0x0, 0x180000000000, 0x4, 0xb6a, 0x5d, 0x3f, 0x2, 0x7fff, 0x6, 0x9, 0x0, 0x4, 0x8000, 0xcb, 0x3100d427, 0x7, 0x2, 0x2, 0x401, 0x100, 0x9, 0x331, 0xb5, 0x7, 0x6, 0x814, 0x3250, 0x100000000, 0x0, 0xb350, 0x9, 0xfffffffffffffff9, 0x5, 0x2, 0x6, 0xfffffffffffffffe, 0x3, 0x8, 0x5, 0xdc95, 0x3, 0xc572, 0xffff, 0x1b, 0x9, 0x7, 0x5, 0xbb, 0x3, 0x8e7, 0x99, 0x81, 0x3, 0x100000001, 0x377, 0x9, 0x1dd3, 0x7, 0xb50, 0x8, 0x40, 0x5c4, 0x1, 0x8, 0x1, 0x1, 0x8, 0x4, 0xffffffff, 0xfffffffffffffff9, 0x200, 0x0, 0x8, 0x2, 0xffffffffffffffff, 0x4, 0x6, 0x100000001, 0x6, 0x0, 0xfffffffffffffc01, 0x1, 0x6cf1, 0x7fffffff, 0x8, 0x80000001, 0x1f, 0x3, 0x3ff, 0x26, 0x10001, 0x5, 0x4, 0xffffffff, 0x1, 0x3, 0x100, 0x26, 0xa3c, 0x10000, 0x9, 0x2, 0xffffffff80000001, 0x7fffffff, 0x101, 0x9, 0x0, 0x4, 0x1, 0x3, 0xddd, 0x7fffffff, 0x7, 0xffffffff, 0x3f, 0x0, 0x3ee9, 0x4000000000000, 0x6, 0x7f, 0xfffffffffffeffff, 0x2, 0xe000000, 0x5, 0x4, 0x1, 0x5, 0x1, 0x1, 0xc5, 0x7ff, 0x80000, 0x8, 0x0, 0x8, 0x7, 0x6, 0x6, 0x9, 0x275, 0x7, 0x6, 0x7, 0x0, 0x1, 0xff, 0x9, 0xfff, 0xeea, 0x3, 0x7, 0xa8, 0x2, 0x2], "77bf91d4e264d382d227fb85b2f27b52236d41c3d2b039df314b8c258787e01be725f57c772fd256266ebfdc05ff321516645ba878bb8d96b9f3e12e954b836af274c172ebf943333f7bfff151cd0efdb07faa7c524c3d2c3e6a7ea6b4ef9990d532ad8f31389296de31c6dbcbfb4c0105d48562f86ff8e8543cfb2a79ecce9db71e144bb21fe3b0c62cc101636a58e4dcddba5f5c715ad4ee9a30f1814d4bc5c78d8b"}}) fcntl$setstatus(r2, 0x4, 0x4000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9000000000000000220097b107b0c6b8000000009cf6f637ec41983ab6014c000001000000000000000000008b000000000066ce656d316e6f246776656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31be0e46a802220303a90b486dcc6370757365746367726f75702463670000000000000000004cb01a3276ac4bb7417800cad72d76ed1a0f16e8a7"], 0x90) 23:56:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f75"], 0x73) 23:56:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000002000), 0x1000) sched_setaffinity(0x0, 0x3cb, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x800000000002, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x4011, r1, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x14, 0x27, 0x20, 0x70bd2c, 0x25dfdbfd, {0x9}, [@generic]}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x20004044) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:46 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @rand_addr=0x3}}, 0x1c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) ftruncate(r1, 0x656b) sysinfo(&(0x7f0000000080)=""/172) [ 650.054086] input: syz1 as /devices/virtual/input/input3783 [ 650.065378] input: syz1 as /devices/virtual/input/input3784 23:56:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f00000000c0)=""/107, 0x6b) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) unshare(0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r1, @ANYBLOB="0d41a9fa8da7e27722a2cc5b9c283bab5e0865ad02b0f01ebb0bbf449e8cc74ea6836678229239b8c2904056ce8b90caa57ccaac584643f5945a851ca3235a3d5c010d5c11", @ANYRESHEX=r1, @ANYBLOB="f0b8b74d4a28909e5e93aad821ad8fee39b4af22438a5d8cced6fb3a4265e7e522f0b2dd47590662d10fb1475af140e235c25d063118067c4d9cba16704ed49a12ab5267c3477b3fe986e4253b246e7ebecb448f8242618ec1f2c42206e4f9010570b85cd7b13ed1045c4a14ffeac9833236fd139ce9ab3296fc61f964aa7978a39b9f15054a810203c4757d1cde", @ANYRES16=r0, @ANYRESHEX=r1], 0x6) [ 650.151514] input: syz1 as /devices/virtual/input/input3785 [ 650.170820] input: syz1 as /devices/virtual/input/input3786 23:56:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) select(0x40, &(0x7f0000000000)={0x2, 0x1, 0x9d42, 0x400, 0xfff, 0x6e, 0x8001, 0x8001}, &(0x7f0000000100)={0x1, 0x9, 0x1ff, 0x8, 0x7ff, 0x10001, 0x2, 0x8}, &(0x7f0000000140)={0x4, 0x7, 0x101, 0x1, 0x6, 0x7}, &(0x7f0000000180)={0x77359400}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000d40)={'nat\x00', 0x0, 0x3, 0x1a, [], 0x7, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000880)=""/26}, &(0x7f0000000dc0)=0x78) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0xd6, 0x8c, 0x2, 0x9}, 'syz0\x00', 0x39}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) symlinkat(&(0x7f0000000e00)='./file0\x00', r1, &(0x7f0000000e40)='./file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSTI(r3, 0x5412, 0xfff) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000240)={0x8, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e21, @multicast2}, 0xc, 0xff, 0x6200000000000000, 0x1f2, 0x6, &(0x7f0000000200)='team_slave_1\x00', 0x80000000, 0x1, 0x5}) [ 650.287149] input: syz1 as /devices/virtual/input/input3787 [ 650.312958] input: syz1 as /devices/virtual/input/input3788 [ 650.324195] input: syz1 as /devices/virtual/input/input3789 23:56:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000011c0)={'syz1\x00', {0x0, 0x7ff, 0x9, 0xffffffffffffd4b8}, 0x4e, [0x7, 0x1, 0x1000, 0x0, 0x8, 0x3, 0x4, 0x5, 0x8000, 0x708e2fb4, 0x800, 0x6, 0x8, 0x8, 0x7, 0x200000, 0xffffffff, 0xb2b8, 0x4, 0x4, 0x401, 0x7fffffff, 0x7, 0x7f, 0x7e, 0x8, 0x2, 0x5, 0x6, 0xfffffffffffffffd, 0xffffffffffff9046, 0x140000000000000, 0x9, 0x2, 0x0, 0x8000, 0x9, 0x79a7, 0x8000, 0x6, 0x40, 0x2, 0x8001, 0x3ff, 0x5, 0x10001, 0x81, 0x299, 0x11, 0xe1b, 0x5, 0x5, 0x4, 0x0, 0x10000, 0x800, 0x1f, 0x596, 0x200, 0x0, 0x4, 0x68d0, 0x4, 0x9], [0x0, 0x2, 0x3, 0x7, 0x9a0, 0xe37, 0x7, 0x2, 0x9f, 0x3, 0xffffffff7fffffff, 0xfffffffffffffff8, 0xe5, 0x5, 0x76, 0x9, 0x3ff, 0x4f57, 0x7, 0xf6, 0x1ff, 0x10000, 0x87e, 0x1000, 0xffffffff, 0x9, 0x40, 0x4, 0xe2, 0xffffffff, 0x0, 0x4, 0x1, 0x18, 0x582585e5, 0x59, 0x0, 0x7fffffff, 0x1, 0x100000001, 0x8001, 0x800, 0x3800000, 0x0, 0x0, 0x1ff, 0xce18, 0x0, 0x2, 0x80000000, 0xffff, 0x4, 0x4, 0x6, 0x10000, 0x9, 0xbcf, 0x7fff, 0x7, 0x3b, 0x294, 0xae, 0xffff, 0x9], [0x3, 0x800, 0x5cba, 0xffffffffffffffff, 0x9, 0x1c00000000, 0x46db76a7, 0x8000, 0x9, 0x0, 0x1, 0x20, 0x8, 0x0, 0x0, 0x0, 0x4, 0x40da, 0x800, 0x6, 0x101, 0x8000, 0xfffffffffffffffc, 0x55, 0x5, 0xfa5, 0x9, 0x9, 0x1f, 0x6, 0x3, 0x7, 0x4, 0x10000, 0x9, 0x0, 0x400, 0x4, 0x4, 0x5, 0x101, 0x8a89, 0xa0a4, 0x8, 0x1, 0xfc2f, 0x7, 0x9, 0x1000, 0x9, 0x1000, 0x10000, 0x922f, 0x0, 0xc21, 0xffffffff, 0x52955ce1, 0x5, 0x3, 0x0, 0x3, 0x0, 0x7, 0x6], [0x800, 0x7fff, 0xa533, 0x9, 0x101, 0x7, 0x4, 0x200, 0x7ff, 0x2, 0x7f, 0x4, 0x5, 0x3, 0x1, 0x7, 0x100000001, 0x800, 0x101, 0x4ded, 0x9, 0x3, 0xfff, 0x4, 0x2, 0xcd37, 0x9, 0x80, 0x3, 0x0, 0x401, 0x4, 0x1, 0x200, 0x6, 0x3, 0x3, 0x9, 0x6, 0x3, 0x5, 0x10000, 0xac, 0x7fffffff, 0x8, 0x8, 0x4, 0x40, 0x5, 0x0, 0xffffffffffffffe1, 0xfffffffffffffff9, 0x8e01, 0x40, 0x7000000000000, 0x0, 0x2ed, 0x8000000000, 0x200, 0x3, 0xffffffffffffff01, 0x5, 0x7, 0x2edbbc0500000]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xa082, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000080)={0x8000, 0x4, 0x4}) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) write$uinput_user_dev(r0, &(0x7f0000000d40)={'syz1\x00', {0x47d, 0x0, 0x7f, 0x2}, 0x35, [0xfffffffffffffff8, 0x5, 0x86e8, 0x8, 0xff, 0x3, 0x3, 0x5, 0x1, 0xffff, 0xffffffffd5e24af7, 0x6, 0x7, 0xa1, 0x80, 0x100, 0x3, 0x100, 0x20, 0x0, 0xa, 0x4, 0x1, 0x400, 0x0, 0x8001, 0x3, 0x4, 0x8, 0x7, 0x30, 0x0, 0x92e, 0xb10, 0x1, 0x1, 0x6, 0x3, 0x6, 0x6, 0xfffffffffffffff2, 0x8, 0x2, 0xffff, 0x3ff, 0x9, 0x6, 0x3, 0x223, 0x0, 0x0, 0x7, 0x4, 0x7ff, 0x1a000000000000, 0xfbb, 0x20, 0x4, 0x1, 0x8, 0x6, 0x8000, 0x7, 0xffffffffffffff87], [0x400, 0x5, 0x7f, 0x40, 0xe3e2, 0x3, 0xaa, 0x0, 0x2, 0x2, 0x1000, 0x0, 0x6, 0x7, 0x80, 0xffffffffffff8000, 0x3, 0x7fff, 0x6, 0x8, 0x6, 0x100000000, 0x81, 0x6, 0x2, 0x40, 0x7fffffff, 0x0, 0x100, 0x5, 0x8, 0x2, 0x80, 0x0, 0x7, 0x813c, 0x1, 0x4, 0xd3, 0x94, 0xffff, 0x7fffffff, 0x8584, 0x4, 0x1000, 0x666, 0x400, 0x2, 0x7, 0x6, 0x1, 0xc352, 0x3800, 0x447b, 0x7, 0x4, 0x2, 0x9, 0x1, 0x100000001, 0x7, 0x6, 0x200, 0x1], [0x4, 0x7, 0x9, 0x1, 0x1, 0xfff, 0x7, 0x52, 0x0, 0x5800000, 0x7fff, 0x5, 0x523f, 0x7, 0x0, 0x0, 0x9, 0x2, 0x80, 0x8a5, 0x2, 0x1, 0x501e, 0x2, 0x6, 0xff, 0x7848, 0x262, 0x20, 0x2000000000000, 0x6, 0x81, 0x73, 0x77f, 0x5, 0x1b, 0x10001, 0x7fffffff, 0x5, 0x7f, 0x8001, 0x7b, 0x2, 0x3, 0x1ff, 0x1000, 0x6, 0xea2c, 0x100, 0x8, 0x5, 0x10001, 0xfff, 0x2, 0x80000000, 0x80000000, 0x7ff, 0x100000000, 0x0, 0x8001, 0x0, 0x1, 0x81], [0x73, 0x3, 0xff, 0x3, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffc1, 0x40, 0x4, 0x9, 0x200, 0xfffffffffffffffb, 0x40, 0x6, 0x1ff, 0x6, 0x1, 0x2800000, 0x1b3e, 0x2, 0x7, 0x4, 0x5, 0x2ee21b49, 0x3, 0x2c, 0xffffffffffffffd5, 0x0, 0x7, 0x6, 0x800, 0xd1, 0xa6f, 0x400, 0x5, 0x0, 0x80, 0x80000001, 0x2000000000000000, 0x9, 0x0, 0xffffffffffffff4c, 0x1, 0x7, 0x7, 0x2, 0x7fff, 0x5, 0x0, 0x100000001, 0x80000001, 0x9, 0x6, 0xfffffffffffffffc, 0x81, 0x1f, 0x20, 0x324000000, 0x1, 0x7fffffff, 0xffffffff, 0xfffffffffffffffc, 0x80000000, 0x1]}, 0x45c) 23:56:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 650.444886] input: syz1 as /devices/virtual/input/input3790 23:56:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) write$FUSE_DIRENT(r32, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 650.493215] input: syz1 as /devices/virtual/input/input3791 23:56:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 650.604888] input: syz1 as /devices/virtual/input/input3792 23:56:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000"], 0x87) 23:56:47 executing program 0: r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0xcdabf6641cd7aa0c) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x1000}}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185b"], 0xac) 23:56:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 650.980536] input: syz1 as /devices/virtual/input/input3793 23:56:47 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.080485] input: syz1 as /devices/virtual/input/input3794 23:56:48 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = dup(r0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) setsockopt(r0, 0x5, 0x713, &(0x7f00000005c0)="2bdfaffb4acf6443533b7fb183401918bafef10cf9dc9a59a568acd9a3b2df2f577961d45b409a26a1dc42f25d223f8825b0db23d6bd90415e0370abe042ac15726721242f3651ea8440f13614fbc01cba727bee50d851a64d8dab9a6a04139acb8fce94a355ad4e03852ead3aea9f966ee2f45811077b63f1eb535e6893d89058b45f58feb65cb16429e23d12a6db7c457fc5d7adc64fa54066b150be26bda401bc3a4c9d69c91431f529321cb571e3a38c6f4206dfb78c236df6bd50bee438361d6f41ba2378bcaef270458ec33a4dbd761e3985b9403ba55aff8f4aeb06defbae290ca7dc5417d8cddfdb18940ca8ae", 0xf1) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x401, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x42200, 0x0) close(r0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000300)={0x1, 0x5, 0x100000000, 0x3, 0x4000000000, 0x10000, 0x7, 0x7fffffff, 0x2, 0x81, 0x8, 0x2}) epoll_create(0x5) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000000c0)={0x9, 0x3000000000000000, 0xffffffffffff8001}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpeername(r3, &(0x7f00000006c0)=@nfc_llcp, &(0x7f00000003c0)=0x80) [ 651.178969] input: syz1 as /devices/virtual/input/input3795 23:56:48 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.239060] input: syz1 as /devices/virtual/input/input3796 23:56:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x480001, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000180)={0x0, 0xbd5a, 0x4, 0x6}, 0x10) timer_create(0x7, &(0x7f0000000000)={0x0, 0x37, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_settime(r2, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000100)) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.291182] input: syz1 as /devices/virtual/input/input3797 23:56:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:48 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r1, r0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r2, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.369762] input: syz1 as /devices/virtual/input/input3798 [ 651.416872] input: syz1 as /devices/virtual/input/input3799 23:56:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/fscreate\x00') ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080), 0x23, 0x0, &(0x7f00000000c0)="84689070ebe2f14795b434139b029f78a35802f1ced52927737814ae52bd23b2e4988f"}) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.460285] input: syz1 as /devices/virtual/input/input3800 [ 651.510742] input: syz1 as /devices/virtual/input/input3801 [ 651.530161] input: syz1 as /devices/virtual/input/input3802 23:56:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367000000000000000000000000"], 0x8c) 23:56:48 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x3c7, 0x400806e, &(0x7f0000000380)={0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r3, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r3, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x10) write$uinput_user_dev(r0, &(0x7f0000000d40)={'syz0\x00', {0x1f, 0x5, 0x77, 0xbad}, 0x54, [0x400, 0xd72, 0x1, 0x8, 0x5, 0x3, 0x2, 0x8, 0x0, 0x0, 0x3eedfe78, 0x2, 0xff, 0x7f, 0xbd, 0x1f, 0x24, 0x5, 0x101, 0x1, 0x80000001, 0x1, 0x80, 0x8, 0x2, 0x1, 0x9, 0x4, 0x0, 0x2, 0x4, 0x81, 0x66ac, 0x3ff, 0x1, 0x1a1, 0x100, 0x1f, 0x8, 0x6, 0x6, 0x1f, 0xffffffff, 0x8, 0xca43, 0x4, 0x7, 0x1, 0xfff, 0x3ff, 0xc000000, 0x10001, 0xe0, 0x1, 0x400, 0xbf, 0xffffffffffffffc1, 0x3022, 0x571, 0x3, 0x4fd, 0x9, 0x5, 0x3], [0xffffffffc3484951, 0x3, 0x81, 0xfff, 0x4, 0x1, 0x4, 0x1, 0xff, 0x4, 0xffffffff, 0xffff, 0x6, 0x35, 0x200, 0x8, 0x3ff, 0xa1, 0x100, 0xcf, 0x8, 0x1, 0x9, 0x0, 0x365, 0x80, 0x6, 0x400, 0x3f, 0xd2e6, 0x100000000, 0x401, 0x401, 0x81, 0x0, 0x20, 0x1, 0x9, 0x7fffffff, 0x2, 0x7fffffff, 0xffff, 0xfffffffffffffff8, 0xff, 0x1, 0x1, 0x100, 0x8, 0x7ff, 0x5, 0x9, 0x4, 0x0, 0x3, 0x3, 0x2, 0x6, 0x8, 0x9, 0x0, 0x9, 0x8, 0x1, 0x5], [0x3, 0x10001, 0xffffffffffffa470, 0xfffffffffffffff9, 0xffffffff, 0x6, 0x6ba, 0x200, 0xfff, 0x7, 0x3, 0x2, 0x8, 0x8001, 0x3, 0x1, 0x3, 0x2, 0x0, 0x2, 0x81, 0xcfe4, 0x4, 0x3, 0x1, 0x8001, 0x5a, 0x1000, 0x3ff, 0x80000001, 0x9, 0xffffffffffff7fff, 0x10001, 0x200, 0x3ff, 0x80000000, 0x8000, 0x80, 0x80, 0x2, 0x1, 0x651, 0x7407fe70, 0x0, 0x3836, 0x800, 0x7, 0xb90a, 0x4, 0x5, 0x3, 0x10001, 0x100, 0x6, 0x9, 0xff, 0x2, 0x7ff, 0xffffffffffff7fff, 0x2, 0x1, 0xfff, 0x776a, 0x6], [0x7, 0x2, 0x3, 0x7ff, 0x3b10, 0x8, 0x8af, 0x7, 0x7fffffff, 0x0, 0xdc, 0x0, 0x1ff, 0xba81, 0x7, 0x7, 0x7, 0x3, 0xd1d, 0xc6, 0x6, 0xff, 0x1, 0x9, 0x5, 0x2, 0x6, 0x4, 0x0, 0x4a0, 0xd9f9, 0x9, 0x8001, 0xffffffff, 0x7, 0x1e, 0x9, 0x8, 0xfffffffffffffff8, 0x3ff, 0x6b2, 0x4d6, 0x8, 0x9, 0x906, 0x0, 0x5, 0x7fff, 0x5, 0x7, 0x7, 0x6, 0x7, 0x2, 0x28fe, 0x1ff000000, 0x8, 0x0, 0x7fff, 0x7, 0x31, 0x100000000, 0x2, 0x8000]}, 0x45c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) ioctl(r1, 0xff, &(0x7f0000000100)="bead31484beb5ac9ea5bdfd76d69c7b936d22439f6a8f4204bac4f460abcb80987e9e3a51b140a1aee8bfb7417165c431e31921a9747f11ba115b2b4b80517d57ff2f4556fc4c100ff3298b7c3eba9ad75b795e73a28686b66be031c7a0b7d36e19b13827ec409fea30ce4d35507b518fb3fba4d721e40edda1ec83dee103cc75ba9c7e8e136d12460040f17c1da9c5cdc2f334fde06c2f7e463ebe3222be4bbf6e6253edf5581b22f808bf136a5cb0f8c52cec36cf675462e377944870cbbdf2422f679b2d580619fd703f7752e6fadb39ad0b109b31618c93973f0895baec57152ce4473354ee0915cfc65be") 23:56:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e09"], 0xc9) 23:56:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x4000002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.784785] input: syz1 as /devices/virtual/input/input3804 [ 651.800476] input: syz1 as /devices/virtual/input/input3806 [ 651.820500] input: syz1 as /devices/virtual/input/input3807 23:56:48 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x440, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x20000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000]}, 0x45c) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)="eb4312875d39fd06f9b6d331a9830375e12f75cfee940c76c36bd6147771289a324e92b18e963b93d21af7cf3a035adc91d2b61c7257b1183c25635b61d178f23158b30c4156a604a169ac19a8cce67d543e7c45c1da737f46c225bce31ee9c6b0296acd71d8349ba5900cf3bdc80e1a6e4b0e81b6d925d55a54ca35d865d6aeb39e864cb4d42985901b63", 0x8b) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)={0xb0, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x17}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xcbb}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x40}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}]}, 0xb0}, 0x1, 0x0, 0x0, 0x840}, 0x4044005) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="bce6da07fd349b8ebf4f964fbaed97ff018c5aacfd6cf377d1ef1a4b2883d4737c82a41b3630a5f4ad8058eb4f00fade16204e49a9ba57581a94d50b12bfa4f4760aa942b9e0e5115ed31091ad6d572b8df9c58acbd2a42594d1a38081c710946560ec095f657ee4de576907dc102d12f6c55462a6a50dc9f5dc880f5af47b7b8ba84ac3ebb4d8dfce38765ef5d365a4ea2b1a654acbdd4706bed66872cde9f69ceb04fdd4740fdf2e93e912533cd180af55b20137bf1361ce68ecca370914f9e2ff24f84c0dfb09b4f7a05ad464d2870e4661b7f4df85fe84455e6d0f0e13647cea0942cb81", 0xe6) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) [ 651.886661] input: syz1 as /devices/virtual/input/input3808 23:56:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x280002, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x5a) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 652.118678] input: syz1 as /devices/virtual/input/input3809 [ 652.134763] input: syz1 as /devices/virtual/input/input3810 23:56:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:49 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x10000, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0xee00, 0x0, 0xee01]) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000003c0)={0x1, 0x3}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x2}, [{0x2, 0x1, r2}], {0x4, 0x3}, [{0x8, 0x0, r3}, {0x8, 0x7, r4}], {0x10, 0x7}, {0x20, 0x2}}, 0x3c, 0x2) [ 652.260212] input: syz1 as /devices/virtual/input/input3811 [ 652.278717] input: syz1 as /devices/virtual/input/input3812 23:56:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) fremovexattr(r0, &(0x7f0000000000)=@known='system.advise\x00') ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udplite6\x00') ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x2) [ 652.414974] input: syz1 as /devices/virtual/input/input3813 [ 652.434182] input: syz1 as /devices/virtual/input/input3814 23:56:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f75702463670000000000000000000000000000"], 0x8e) 23:56:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240020000000000000000000000000002c0000000000007a9f053823b7c94f5a3276ce8c9461000000000000001c000000000000002bd77248dc65746a48be1b31486dcc6370757365746367726f777024636700000000000000000000000000000000"], 0x90) 23:56:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/207, 0xcf}, {&(0x7f0000000180)=""/116, 0x74}], 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee00"], 0xd7) [ 652.657400] input: syz1 as /devices/virtual/input/input3815 [ 652.676643] input: syz1 as /devices/virtual/input/input3816 23:56:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c004d2a6d384c77f978b2817a65677b73dc681458"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x9, 0x5d, 0x1, 0x3, 0x8, 0xffff}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x600000, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0/file0\x00', &(0x7f00000003c0)='fuse\x00', 0x2, &(0x7f00000005c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xff}}, {@max_read={'max_read', 0x3d, 0xff}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}, {@uid_lt={'uid<', r1}}, {@permit_directio='permit_directio'}, {@seclabel='seclabel'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@seclabel='seclabel'}]}}) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x8) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='ppp0cgroupkeyringself)em0%wlan1\'em1\x00', 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)='syz1\x00') ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000080)=""/210) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 652.812002] input: syz1 as /devices/virtual/input/input3817 [ 652.851370] input: syz1 as /devices/virtual/input/input3818 23:56:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x90202, 0x2c) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 652.937446] input: syz1 as /devices/virtual/input/input3819 [ 652.955066] input: syz1 as /devices/virtual/input/input3820 23:56:49 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='u:r:untrusted_app:s0:c512,c768\x00', 0x1f, 0x3) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r1, &(0x7f0000004d00)=""/4096, 0x57) 23:56:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffd3b) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x16, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x4, 0xfffffffffffffffd, 0x0, 0x100000000}}, 0xfffffffffffffed4) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) [ 653.056675] input: syz1 as /devices/virtual/input/input3821 [ 653.075723] input: syz1 as /devices/virtual/input/input3822 23:56:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367000000000000000000000000000000"], 0x8f) 23:56:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce0000"], 0xde) [ 653.526184] input: syz1 as /devices/virtual/input/input3823 [ 653.544116] input: syz1 as /devices/virtual/input/input3824 23:56:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000080), 0x1, 0x8) read(r0, &(0x7f0000004d00)=""/4096, 0x1000) 23:56:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:56:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0xffffffffffffffff, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000040)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x6) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) 23:56:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{}, 'syz1\x00'}) write$uinput_user_dev(r0, &(0x7f00000008c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) read(r0, &(0x7f0000001d00)=""/4096, 0x1000) [ 653.717368] input: syz1 as /devices/virtual/input/input3827 [ 653.733446] input: syz1 as /devices/virtual/input/input3828 23:56:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f75702463670000000000000000000000000000"], 0x8e) 23:56:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000005c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) 23:56:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x3000, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@uid_gt={'uid>', r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@pcr={'pcr', 0x3d, 0x3}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@fsmagic={'fsmagic', 0x3d, 0x20}}]}}) 23:56:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000"], 0xe2) 23:56:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:51 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x101000, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180)=""/53, &(0x7f00000002c0)=0x35) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce3"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) futimesat(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={{0x77359400}, {r2, r3/1000+30000}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000005c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000640)={0x2219bef2, {{0x2, 0x4e20, @loopback}}, 0x1, 0x8, [{{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @rand_addr=0x6}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e23, @loopback}}]}, 0x490) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r6, 0x402, 0x10) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000240)={0xffffffff}, &(0x7f0000000280), 0x8) socket$inet6(0xa, 0x1000000000002, 0x0) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(r8, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)='}cpuset\x00', 0xffffffffffffffff}, 0x30) getpgrp(r9) ioctl$BLKIOOPT(r7, 0x1279, &(0x7f0000000380)) fcntl$setflags(r6, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000200)) fstat(r5, &(0x7f0000001900)) 23:56:51 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:51 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="66643d16d53c9371ea38adebcce2c23ceacd49e914063d4af1217d69459d8281da8a4969409ae184f12a860e6534cc0c5e7f5e698d73a372ec2b3a413b8d945af28e5fbaf9f7bdb6484112528ec63c095789d66fe22b45f9b232b710d416d7c08d7e5453750893f9a3cd333029", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x30, 0x0, 0x3, [{0x2, 0x8, 0x2, 0x3, 'fd'}]}, 0x30) read$FUSE(r0, &(0x7f00000050c0), 0x6da) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lsetxattr$security_selinux(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x3) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce0000000000000000"], 0xe4) 23:56:52 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:56:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x60) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0xfffffffffffffe09) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote, 0x0, 0xff}, 0x0, @in=@multicast2, 0x0, 0xfffffffffffffffd}}, 0xe8) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200000200000004000000000000000bce48a681c228010000008e9137c99c6204d6824dedd93283554b28cd9b15558de3b8773497428caab6ec5ce8244c394c88aa98665e92bce0d53dc94dad2007fbeb0e2c5cff90174f321ef493"], 0x5d}}, 0x0) recvmmsg(r3, &(0x7f0000000f00)=[{{&(0x7f00000003c0)=@rc, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000080)=""/30, 0x1e}}, {{&(0x7f00000005c0)=@in6, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000740)=""/186, 0xba}}, {{&(0x7f0000000800), 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000001340)=""/4096, 0x1000}}], 0x3, 0x0, &(0x7f0000001000)={0x77359400}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:52 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:56:52 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:52 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffeb5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) accept$unix(r1, &(0x7f0000000180), &(0x7f0000000340)=0x6e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x118, 0x0, 0x3, [{0x0, 0x5, 0x2, 0x8, '@@'}, {0x1, 0x3, 0x5, 0x4, 'fuse\x00'}, {0x0, 0x8, 0x0, 0x14bc}, {0x1, 0x80, 0x5, 0xafd, 'fuse\x00'}, {0x2, 0x1, 0x2b, 0xffff, "2d6367726f7570213a76626f786e6574310270707030656d3173656c696e757826252d4074727573746564"}, {0x3, 0x8001, 0xa, 0xa9, '/dev/fuse\x00'}, {0x3, 0x7, 0x8, 0x80000000, '-{/\\ppp1'}]}, 0x118) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz0\x00', {0x200, 0xffffffff, 0x7ff, 0xff}, 0x17, [0x13a, 0x0, 0xff, 0x3ff, 0x2, 0x9, 0x1, 0x54, 0x6, 0xffffffffffff1847, 0x1, 0x6, 0x10000000000, 0x4, 0x9, 0x8, 0x5, 0x8, 0x3, 0x4, 0x80000000, 0x80000001, 0x8001, 0xffff, 0x4, 0xfe9c, 0x3, 0x8d, 0x3, 0x5, 0x6, 0x5, 0x5, 0x7, 0x3, 0x8000, 0x7, 0x0, 0x0, 0x0, 0x2, 0x8, 0x100000001, 0x3, 0x1, 0x1, 0x6, 0x2, 0x3, 0xfff, 0xfff, 0xda3b, 0x425f, 0x4, 0x8, 0x5, 0x81, 0x8, 0x1, 0x1, 0x100, 0x7f, 0x80000000, 0xfffffffffffffffd], [0x8, 0xfff, 0xffffffffffffff7f, 0x6, 0x800, 0x6, 0x8001, 0x7, 0xfffffffffffffffe, 0x0, 0xa4, 0x8, 0x3ff, 0x0, 0x6f, 0x6, 0x2, 0x3, 0x20, 0x1, 0x7, 0x8, 0x0, 0x40, 0x14, 0x80e, 0x4000, 0x4, 0x8, 0x1c, 0x78a, 0xb9, 0xd7c7, 0x3678df1e, 0x3, 0xfff, 0x7ff, 0x4eb, 0x9, 0x0, 0x7, 0x7fff, 0xfff, 0x7, 0x9, 0x20, 0xa000000000000000, 0xffffffff, 0x9, 0x800, 0xffffffff, 0x2, 0x100000000, 0x2, 0x2, 0x10001, 0x2, 0x1, 0xd7e, 0xffffffffffff103f, 0x81, 0x1, 0x9, 0x6], [0x2, 0x4, 0x7ff, 0x7, 0x4c, 0xdb2, 0x6, 0xfffffffffffffffc, 0x1, 0x6, 0x0, 0x100000000, 0x20, 0x3, 0x3ff, 0x2, 0x9db8, 0x74, 0x7fffffff, 0x6, 0x1, 0xea6, 0x0, 0x8f3, 0x200, 0x2, 0xfd0e, 0x3ff, 0x74, 0x1, 0x56, 0x5, 0x6, 0x86, 0x80, 0x276ce095, 0x2, 0x3, 0x2, 0x5, 0x1, 0x1, 0xfff, 0xe83, 0xffff, 0x0, 0x5, 0x1, 0xee, 0xfffffffffffffff9, 0x2, 0x8, 0x9c5, 0x2, 0x5, 0xe98f, 0x4, 0x9, 0x7, 0x3f, 0x4, 0x4, 0x7fffffff], [0xffff, 0x6, 0xfffffffffffffffe, 0x2, 0x8001, 0x8, 0x8, 0x100000001, 0x7fffffff, 0x2, 0xffff, 0x3ff, 0x8, 0x9, 0xed, 0x1, 0x21a4, 0x7, 0xffffffff, 0x2d0, 0x1000, 0xffffffffffffff01, 0x9, 0x81, 0x5, 0x3ff, 0x3, 0x7fffffff, 0x5, 0xfffffffffffffe01, 0x7a, 0x1, 0x0, 0x6, 0x0, 0x7fff, 0x1, 0x6, 0x1, 0x1, 0x10000, 0x6, 0x7, 0x5, 0x6, 0x3, 0x400, 0x8, 0x9, 0x10000, 0x1, 0x37, 0xfff, 0x9, 0x5, 0xaba1000000, 0x4, 0x985, 0x3, 0x5, 0x5, 0x0, 0x7d8f, 0x1000]}, 0x45c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group|id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:53 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:56:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0x1000, 0x72}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000000c0)={0x7, 0x3, 0x1, 0x5c6a, 0x3f, 0xff}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:53 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:53 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:53 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a20b8bc07108b9bab57bbb15c40485f79dd4509bb651dca0c50c99634beaabed454ff134b4f165a206f55eb4fbf33f9daae91e8f88db5a593c38d3320ef1e2636019eb1418e1df0927c73174244f72f2ba409ce803b195a4925a72e40d69d87d8c8025c358d344dd132e2387e793a2f2"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b42e03b8f54742aae27b998b85975777379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r1 = getpgid(0xffffffffffffffff) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 23:56:53 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) 23:56:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = dup(r0) syz_open_pts(r1, 0x428a00) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f00000003c0)={0x3, 0x2, 0x49}) fadvise64(r0, 0x0, 0x8b, 0x7) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) ioctl$TIOCNXCL(r2, 0x540d) fgetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000180)=""/32, 0x20) ioctl$int_out(r0, 0x5462, &(0x7f00000001c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000968e000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce00000000000000"], 0xe5) 23:56:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$setpipe(r0, 0x407, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x0, 0x2710}, {r2, r3/1000+10000}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) 23:56:54 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@ax25, &(0x7f0000000040)=0x80, 0x800) accept(r0, &(0x7f0000000780)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000800)=0x80) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000840)={r2, 0x1, 0x6, @random="18fe70c96fcf"}, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:54 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:54 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0xe5) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14, 0x80000) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)=""/35, 0x23}], 0x1, &(0x7f00000006c0)=""/5, 0x5, 0x9}, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000a40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009b80)={'bond_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000009bc0)={'bond_slave_1\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009c40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009d40)={'sit0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009d80)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000009e80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000009ec0)={'ip_vti0\x00', r8}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009f40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000009f80)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f000000a080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000d80)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f000000a1c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000e3c0)=[{{&(0x7f000000a200)=@nfc, 0x80, &(0x7f000000a3c0)=[{&(0x7f000000a280)=""/149, 0x95}, {&(0x7f000000a340)=""/14, 0xe}, {&(0x7f000000a380)=""/7, 0x7}], 0x3, &(0x7f000000a400)=""/238, 0xee, 0x5}, 0x4}, {{&(0x7f000000a500)=@nl=@proc, 0x80, &(0x7f000000a680)=[{&(0x7f000000a580)=""/108, 0x6c}, {&(0x7f000000a600)=""/89, 0x59}], 0x2, &(0x7f000000a6c0)=""/225, 0xe1, 0x5}, 0xffffffff}, {{&(0x7f000000a7c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f000000ac00)=[{&(0x7f000000a840)=""/20, 0x14}, {&(0x7f000000a880)=""/115, 0x73}, {&(0x7f000000a900)=""/70, 0x46}, {&(0x7f000000a980)=""/229, 0xe5}, {&(0x7f000000aa80)=""/71, 0x47}, {&(0x7f000000ab00)=""/25, 0x19}, {&(0x7f000000ab40)=""/168, 0xa8}], 0x7, &(0x7f000000ac80)=""/162, 0xa2, 0x1}, 0x7}, {{&(0x7f000000ad40)=@can={0x1d, 0x0}, 0x80, &(0x7f000000b200)=[{&(0x7f000000adc0)=""/37, 0x25}, {&(0x7f000000ae00)=""/111, 0x6f}, {&(0x7f000000ae80)=""/12, 0xc}, {&(0x7f000000aec0)=""/131, 0x83}, {&(0x7f000000af80)=""/213, 0xd5}, {&(0x7f000000b080)=""/250, 0xfa}, {&(0x7f000000b180)=""/95, 0x5f}], 0x7, &(0x7f000000b280)=""/234, 0xea, 0x80000001}, 0x20}, {{&(0x7f000000b380)=@alg, 0x80, &(0x7f000000b480)=[{&(0x7f000000b400)=""/120, 0x78}], 0x1, &(0x7f000000b4c0)=""/116, 0x74, 0x2f}, 0x40400000}, {{&(0x7f000000b540)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f000000c980)=[{&(0x7f000000b5c0)=""/136, 0x88}, {&(0x7f000000b680)=""/219, 0xdb}, {&(0x7f000000b780)=""/133, 0x85}, {&(0x7f000000b840)=""/234, 0xea}, {&(0x7f000000b940)=""/4096, 0x1000}, {&(0x7f000000c940)=""/45, 0x2d}], 0x6, &(0x7f000000ca00)=""/196, 0xc4, 0x800}, 0x5}, {{&(0x7f000000cb00)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f000000ce80)=[{&(0x7f000000cb80)=""/59, 0x3b}, {&(0x7f000000cbc0)=""/21, 0x15}, {&(0x7f000000cc00)=""/157, 0x9d}, {&(0x7f000000ccc0)=""/161, 0xa1}, {&(0x7f000000cd80)=""/222, 0xde}], 0x5, 0x0, 0x0, 0x9}, 0xf48}, {{0x0, 0x0, &(0x7f000000e240)=[{&(0x7f000000cf00)=""/249, 0xf9}, {&(0x7f000000d000)=""/4096, 0x1000}, {&(0x7f000000e000)=""/238, 0xee}, {&(0x7f000000e100)=""/225, 0xe1}, {&(0x7f000000e200)=""/42, 0x2a}], 0x5, &(0x7f000000e2c0)=""/216, 0xd8, 0x7fffffff}, 0xfffffffffffffffb}], 0x8, 0x10000, &(0x7f000000e5c0)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f000000e600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000e640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e680)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f000000e780)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000e800)={0x0, @local, @dev}, &(0x7f000000e840)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f000000e880)={0x11, 0x0, 0x0}, &(0x7f000000e8c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000e900)={@ipv4={[], [], @local}, 0x0}, &(0x7f000000e940)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000eac0)={0x0, @multicast2, @broadcast}, &(0x7f000000eb00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f000000eb40)={@ipv4={[], [], @remote}, 0x0}, &(0x7f000000eb80)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f000000f700)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x90008800}, 0xc, &(0x7f000000f6c0)={&(0x7f000000ebc0)={0xadc, r2, 0x300, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x260, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1, 0x6, 0x4, 0x7}, {0x7e, 0x5, 0x8, 0x2}, {0x9, 0x2, 0x24, 0x4}, {0x2, 0x40, 0x5, 0x9}, {0x800, 0x4, 0x9, 0x3}, {0x0, 0x7bafb813, 0x8, 0x4}, {0x2, 0x339, 0x7ff, 0x1f89}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x298, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r12}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x80000001, 0x7fffffff, 0x11, 0x100}, {0x4, 0x4, 0x0, 0x401}, {0xa173, 0x2, 0x2, 0x7}, {0x80, 0x80000001, 0x200, 0x6b}, {0x900000000000000, 0x100000000, 0x7, 0xfffffffffffff050}, {0x6, 0x3, 0x7f, 0x2}, {0x4, 0x100000001, 0xffff, 0x8}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r13}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x12c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff7fff}}}]}}, {{0x8, 0x1, r16}, {0x26c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r21}, {0x14c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xffffffffffffff01, 0xffffffff, 0x2, 0x8}, {0x10001, 0xa4a, 0x2, 0x6}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r22}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x513, 0xb5, 0x8001, 0x9}, {0x6a58, 0x0, 0x3, 0x8000}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}]}}]}, 0xadc}, 0x1, 0x0, 0x0, 0x1}, 0x4000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x202080, 0x0) 23:56:54 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:54 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:55 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x121000, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000180)=""/124) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:55 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0xfffffffffffffd6b, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r32, &(0x7f00000030c0), 0x1000) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="82024324cdc6e8dfd5e4cf11d727cd831a45a89f13cf9bd5a5d77e929c6d9245db8e127ba53bfb1f8b02fe8adcf97d99cc4e954fa065ff96bca39b26aa4e7cba93d43531d3dc63af686552fd5c5a41c720c3619c903891bc485b8b3ad2079c9b71e3783dae2a33d91bf0110913e4fab79cf687fb857026582120"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000001f7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000124a000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:56 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:56 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x181002, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x3, 0x8, 0xff, 0xd756, 0x164, 0x4}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:57 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6fdb6576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc637075739aff7e53237d6b20e840642965746367726f757024636700000000000000000000000000000000ca8cee59385789627f8b78f4c2f6b78833367c815d568fe95107e0d8691fa53382e0fae1a8c7084995f64cbd2d4f10df3ee533998cd63af189cce8618b297428b2e3344f49bb937547f811c542d44128383f417139b7f99b3f2a1c52fc5191ae15c06401f50d9f29184fd45c03e43e049c54e5a00ea72e02962294ae91045f54e0b360f5d5edb9182041bf3632543725bde93bf9f31e5d68b38a752a92b986a8af07e4b46d7adf2955da7c339fd769e3d9809ea89a84f4ff4d8b5bbfe8c744e38b4908c942407b9a9d4faf6d77212e384a453bef9ae3c0885e65923d29da02ede97ef08536e5a6"], 0x90) 23:56:57 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:57 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x5) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x90) 23:56:58 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:58 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = dup(r0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) lstat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000580)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:56:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r32}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9000000000000000020080000000000001000000000000000000008b000000006b56f8a0b6ca0066ce656dc4e67feb386557dc316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:59 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:56:59 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xe5) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) r32 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r32, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r32, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r32, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r32, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:56:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can={0x1d, 0x0}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600)={0x11, 0x0, 0x0}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0}, &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev, 0x0}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can={0x1d, 0x0}, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00', 0x0}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r29, r30+30000000}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000c5c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000c580)={&(0x7f000000bc40)={0x908, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r8}, {0x28c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1e4c5947}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x401, 0xfff, 0x9, 0x20}, {0x6, 0x100000001, 0x4751, 0x929b}, {0x4, 0x9ae, 0x3f, 0x40}, {0x3f, 0x1, 0x5, 0x1}, {0x1, 0x7, 0x10001, 0x80000001}, {0x9e38, 0x5, 0xd08, 0x4}, {0xcf36, 0x5aa, 0x3, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x78, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}]}}, {{0x8, 0x1, r25}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0xb0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}]}, 0x908}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00'}) clock_gettime(0x0, &(0x7f000000bbc0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b9c0)=[{{&(0x7f0000005780)=@pppol2tpin6, 0x80, &(0x7f0000005980)=[{&(0x7f0000005800)=""/205, 0xcd}, {&(0x7f0000005900)=""/74, 0x4a}], 0x2, &(0x7f00000059c0)=""/229, 0xe5, 0x4}, 0x7fffffff}, {{&(0x7f0000005ac0)=@rc, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005b40)=""/250, 0xfa}, {&(0x7f0000005c40)}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)=""/56, 0x38}, {&(0x7f0000005dc0)=""/159, 0x9f}], 0x5, &(0x7f0000005f00)=""/105, 0x69, 0x9}, 0x1000}, {{&(0x7f0000005f80)=@xdp, 0x80, &(0x7f0000006380)=[{&(0x7f0000006000)=""/148, 0x94}, {&(0x7f00000060c0)=""/207, 0xcf}, {&(0x7f00000061c0)=""/240, 0xf0}, {&(0x7f00000062c0)=""/130, 0x82}], 0x4, &(0x7f00000063c0)=""/255, 0xff, 0x1}, 0x200}, {{&(0x7f00000064c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000086c0)=[{&(0x7f0000006540)=""/162, 0xa2}, {&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/169, 0xa9}], 0x4, &(0x7f0000008700)=""/136, 0x88, 0x400}, 0x8001}, {{&(0x7f00000087c0)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008840)=""/16, 0x10}, {&(0x7f0000008880)=""/4096, 0x1000}, {&(0x7f0000009880)=""/72, 0x48}, {&(0x7f0000009900)=""/4096, 0x1000}, {&(0x7f000000a900)=""/157, 0x9d}, {&(0x7f000000a9c0)=""/193, 0xc1}, {&(0x7f000000aac0)=""/68, 0x44}, {&(0x7f000000ab40)=""/131, 0x83}, {&(0x7f000000ac00)=""/195, 0xc3}], 0x9, &(0x7f000000adc0)=""/241, 0xf1}, 0x3f}, {{&(0x7f000000aec0)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b0c0)=[{&(0x7f000000af40)=""/83, 0x53}, {&(0x7f000000afc0)=""/253, 0xfd}], 0x2, &(0x7f000000b100)=""/90, 0x5a, 0xbf1e}, 0x5}, {{&(0x7f000000b180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000000b5c0)=[{&(0x7f000000b200)=""/106, 0x6a}, {&(0x7f000000b280)=""/2, 0x2}, {&(0x7f000000b2c0)=""/251, 0xfb}, {&(0x7f000000b3c0)=""/49, 0x31}, {&(0x7f000000b400)=""/129, 0x81}, {&(0x7f000000b4c0)=""/77, 0x4d}, {&(0x7f000000b540)=""/109, 0x6d}], 0x7, &(0x7f000000b640)=""/11, 0xb, 0x8}, 0x80000000}, {{&(0x7f000000b680)=@ethernet={0x0, @local}, 0x80, &(0x7f000000b940)=[{&(0x7f000000b700)=""/27, 0x1b}, {&(0x7f000000b740)=""/145, 0x91}, {&(0x7f000000b800)=""/42, 0x2a}, {&(0x7f000000b840)=""/211, 0xd3}], 0x4, &(0x7f000000b980)=""/41, 0x29, 0x5}, 0xfff}], 0x8, 0x40000000, &(0x7f000000bc00)={r0, r1+30000000}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000800)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f00000000c0)={0x10001, 0xff, 0x80000001}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:00 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:00 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$binfmt_script(r0, &(0x7f0000000500)={'#! ', './file0', [{0x20, 'user'}, {0x20, 'user_id'}, {0x20, 'nodev'}, {}, {0x20, 'user_id'}, {0x20, 'rootmode'}, {}], 0xa, "a36bbd3c29af8314e254985157246aa6da2a89602eeb134d5f1f2277053f1ee74d39573b81a643ff181a3e2abff7ecf94d163310b14c5880a3dfb2052c17ed1917d3d953efe5697943ac593c676e90425dd28128ba436b1e8f7500a2b934031adc461eec530bf42383aaea4b60dd407e8f1180209523e2df264d6834f716241dd14893368d6b11d40d1cb173f8"}, 0xbe) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)="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") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f2465c9ebb800088d3d84b83f76656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111"], 0xe5) 23:57:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00'}) clock_gettime(0x0, &(0x7f000000bbc0)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) [ 663.524604] device lo entered promiscuous mode 23:57:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005740)={'team0\x00'}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:00 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005700)=0x14) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) fadvise64(r0, 0x0, 0x8, 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)={{0x77359400}, {r1, r2/1000+10000}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6d246576656d2400f5000000080000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc63702463670000000000000000000000000004000000000000000000000000"], 0x90) 23:57:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000043c0)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:01 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = open(&(0x7f00000000c0)='./file0/file1\x00', 0x241, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='bic\x00', 0x4) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) statfs(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0)=""/80) getpid() 23:57:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x3d, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f046576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02a1b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000000000000000000000"], 0xe5) 23:57:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) chmod(&(0x7f0000000040)='./file0/file0\x00', 0x80) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000180)=0x7f) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc63707573657c6367726f757024636700000000000000000000000000000000"], 0x90) 23:57:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:01 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f00000000c0)=[r1, r1, r1, r1, r1, r1]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000180)={0x20, 0x0, 0x2, {0xffffffffffff5d5f, 0x0, 0x1ff, 0x8}}, 0x20) dup3(r0, r0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x6, {0x7, 0x1b, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x3}}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) memfd_create(&(0x7f0000000040)='user\x00', 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000$0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9450000000000000001c000000000000002b7379737465746a48be1b31486dcc6370007365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) socketpair(0x1b, 0x5, 0x2c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000180), 0x81) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000001000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c01047d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grmup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) stat(&(0x7f0000000740)='./file0/file0/file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2050, &(0x7f0000000800)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@blksize={'blksize', 0x3d, 0xe00}}, {@allow_other='allow_other'}], [{@euid_gt={'euid>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@smackfshat={'smackfshat', 0x3d, 'fd'}}, {@euid_eq={'euid', 0x3d, r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@smackfshat={'smackfshat', 0x3d, '\'md5sum,security*'}}, {@euid_lt={'euid<', r5}}]}}) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d385f53a70c42d75100000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370758865746367726f757024636700000000000000000000000000000000"], 0x90) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x5441, 0x9) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b73f0737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x0, r1}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367000000000000000000000000e1000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sockfs\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$P9_RWALK(r1, &(0x7f00000002c0)={0x57, 0x6f, 0x1, {0x6, [{0x40, 0x0, 0x3}, {0x4, 0x4, 0x1}, {0x0, 0x0, 0x3}, {0xa, 0x0, 0x7}, {0x22, 0x1, 0x3}, {0x40, 0x1, 0x7}]}}, 0x57) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b00000b75255cce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465742648be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f00000003c0)) r3 = dup(r0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast1, @local}, &(0x7f00000004c0)=0xc) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r3, &(0x7f0000002e00)=[{{&(0x7f0000000700)=@ll={0x11, 0x2, r4, 0x1, 0x7ff, 0x6, @broadcast}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000800)="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", 0xff}, {&(0x7f0000000900)="2a1581e69bdec24b2fea806cea3d3a97", 0x10}, {&(0x7f0000000940)="9a806e0957ee267fbbc7fb4e1a231ca185bdebef4677de3b084d4bd35349cea4e06a8373f78a62515fe2da0d191d91a9b4f76c66e7d1c3562f624a28b28595e8a578bea09c2640395bc4bf7393701300e2ef5511e4701a809c84c1691730c2a034922148b859027e5d7dcdf201b53450187f39255bbf62a7f8d9f6a3c5f7c3efc32f246ced0c5f01f768c6b2ac047801d4644a6791ef9d89626750c32cb4cc2502f947c4a212c63c0164942d40cf49319b0609818d68543e30c05c1b8398deacaf66ec2c", 0xc4}, {&(0x7f0000000a40)="5aa897b80253e273634661e86524b0fc821c6d0a8c110278db1e47d3a8bd09681635d404a3b42311b08b1ec9a5ce55fd76051630761ec2dc45", 0x39}, {&(0x7f0000000a80)="836fbf3a1eed1340cacb81cc9b98a21fa4f10c57d1e9d00c8720afe1693547bea7e2e77b2e834ee95e25a138387a9ea5d9211954f989c76f7ed0139b6d198d9e4e03fbb466a02e0edc51f628e052f4313f95a97eaa4eb43ac811934476bc74bc690e7e420f49a73e1697ef54fc489bdd99dc3246a1354af4b8cfeeed171f1f7461fe7d4cef86eeb43b5c9bb17027feaa7df1f42033bd91335574b67b54576e0bfbd2cd75155c9bcd16586a6d56bcb47789", 0xb1}, {&(0x7f0000000b40)="e1f81f4e4a6f5888ffac75ebd20c38f45d6e8d22c33c0b60d610f84c705831b1f261b7b31c89bb8d5be919b03e8c5cbae10461c3ab2123d854268529933d479c26a1b87915745320570a7ce99f0fa06ddcd01a8b9d0987085bf3562948aa83e42a7fa1d0aa0b3aca100360bfef0220", 0x6f}, {&(0x7f0000000bc0)="7a7eb2b69cf4cd19fb85ee898de3f098a3e624c20bf81d405e59fb25e93fba6f66e8", 0x22}, {&(0x7f0000000c00)="958208f850ea7dee7b2150de68a5b445bbc360c1fd882dbc293a724a0355eb2d34ca33a76403e0edb94b5d957b926066943466cb0ed4233e84a58410580dd66098a10f8c865c33c1d47c51d01667c0f18457e9e69f47a4312d7cf87d05c6c587b75e44ac7fef6ced4d12991e04e4471a0ba2e8ddfc30e23ea6cc5ec6115000a3a8a17ee59a47916fdfed376530e8bbfffb240534653a7db832a85b27695f2002bd61bf3480422e2ae51d485424f060ee49db4d6e4acba503849e8b36e6bae4be84bb5e14fe760763df9e9d2c350f35e833b8c2df8253d8e4dd8dc238a4238d7f9d1071ebc5", 0xe5}, {&(0x7f0000000d00)="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", 0xff}], 0x9, 0x0, 0x0, 0x1}, 0x3}, {{&(0x7f0000000ec0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x80, &(0x7f0000002080)=[{&(0x7f0000000f40)="9334d928b48e829e983e7fe18b951745d13fb2bcee682bc60025a813c8beff305e5c3de68d4be21e99f20227428fe38c0a053bb46ff091e3b3266f680faa88b08c893188bff99aaf6597e1d8d5cf4db4e1806bb6ac2cb6de6d2c07ca192d33a7745474380eb6f3d6aa7f995877d3097853130562ad18ad329749a352f1195e4ec5348930438fd4311b3804f67b28fa592c356a960269d07d1f4c9b9b17e6ce64ec6f5f5541d690cb", 0xa8}, {&(0x7f0000002000)="7a5a985ab036f153617e08c45908c2f657875b19e56d3f554265cdfa9bc14fbb9c3f5cb7d861bcfbb29867702de38bf6d9c59ae04343ce2981f9bb0d3b16cb91777a8ee9f8b35ca8aa7215bbc378", 0x4e}], 0x2, 0x0, 0x0, 0x881}, 0x3}, {{&(0x7f00000020c0)=@rc={0x1f, {0x6, 0x5444, 0x3, 0x3, 0x4, 0xa12}, 0x9c9}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000002140)="73cec103a4fe1b46db0b201ca5c5ae28c8330d0103cf790a0f67b3dcf9dd9319e7b6370caf9c09dadaca79e71350291bb38a67b0f3e8715458ed7a720446505bb6be39f9bc90263f4311843c3d09fc482be38d6c13b3fd3839d77f2c68cc97578efdd9f9e6236a80f05396", 0x6b}], 0x1, 0x0, 0x0, 0x4}, 0x4511000000000000}, {{&(0x7f0000002240)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e24, @multicast2}, 0x1, 0x3, 0x3, 0x2}}, 0x80, &(0x7f00000023c0)=[{&(0x7f00000022c0)="9659d04dafbaaef35a645901a576f796c3af6870b484ce2e5e645555d9f4c4e454e92d17e238de732b6c766b7fa86dc0e38cea1286b14c66ebfc73fdbb692f3f683580085a02f9960369fd39c98df17cfc0c0c0237a454d4c0094bac39f6885c4c0686098d05b4b34ff6cb65e15e611a1adb08e20e942b25f9cb4b69475c702db6bbce7538d5a4ee1beb656fe2beb95202e5091bb62eb01991851d17ecaad1618336e902a15792af934e81d3f411464344", 0xb1}, {&(0x7f0000002380)="75711f39226548e45f2fb8f2fe1f178897895f7d054355bfa04a4613", 0x1c}], 0x2, &(0x7f0000002400)=[{0xc8, 0x3a, 0x1, "46f6698fcdb4a636bae53340128748796bfb6018154607c9f98376591880ea01d9b29c7ea1e3993e22945c06a2cd5851459520a71c2c5b391e2cd9fa8ff67b3fd00a6266f618f03f007fd8167dd8beedaf8a2ab637b66835dc3c41a16a83f4d2856415ad1625f1b80d22729b21873cd0b494caec3b1acde77988e6858cdd2f98190dd1c0a57e06c81073bb1f653784da9531aae505f7789cc4517ecafb1c8a839913c510ef900ba45ea950d589524872e070592853f0d1cb"}, {0x60, 0x101, 0xa264, "99607d3f4108afb541fcc574890765cdf705aa054555adf56e59a1f09ad6f46b0de3c41e7840994431ccfbc0590c4b0ce5d64f9447256958df0dcea7b39b6f2fbe61eb7cd9675725e97b102a"}, {0xa8, 0xff, 0x258, "cdb6a9045c60412994350c3674915158692e427e34d630e1733808b8c6869220efb7d835407ebb5bfcb2c2b59d77190acb340a63defe76dfffc7c0f908e7233a41fab49a0e0fe802b815ecb16f9952ff58a9cf7dc803c57354f9dbbf49794ad278c4264561450b687da2277b40e9e5dfd50e10a3946f0deeba4ddfa11984ba8d5dce5916fecf320e5bd4a3c4a9367288092b06d3a89dd9a3"}, {0x18, 0x0, 0x2, "dc10b0"}, {0xb0, 0x117, 0x80, "039400377d599c98219315c9b901ee35bbfde6546c530192afbaf8a4a4c1d43a0051b4f1d074eff259499e3a658f9b14573186c307da5b0f2539364154be4eef8c60069e5538d917192df2f9dd420068bafbacc1f0d4861436c22609a800298ddefcec490d185e9e05554659d9d935b899e7357d54eeb879fc9786bd0adb51c13afdec40170287417c9892462c0dd150c19e9a3192a4ad99e4"}, {0x28, 0x11f, 0x0, "b2fb3b8c45c9f08354d90a464e1fab9d0496e955e26217"}], 0x2c0, 0x400c000}, 0x8}, {{&(0x7f00000026c0)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002740)="3de8f90f4eb53768eb9715442f2d2a450d6e41b4e9ce8e92b1b5c84630c40fce0498a7fdebdc2bbb72b4b45d2cc3218e93a6d455a6b58322ac0bdcb37a003ddc836766e2eb4be5efc6e32d84f4c12e446d4ec562a482dc194e9baa1f288cad027c84b159d9b3d8a53a1807c02f812434f274c7d15237b5b6185822dda83ada0774f2c26179b8f57e8c598c701c7701a21927b5f15856f1dc7c1746ef8a8aa6d5f611a63241622a3d", 0xa8}, {&(0x7f0000002800)="01df9d18aaf974d56d1bff78ed041ae4f0b82fa81dfb9cff5785b60683dd115a557f", 0x22}, {&(0x7f0000002840)="534f41b72ef27eabe8077200d71b48ec821b897b254f8d113d9fa21c69f438c153f043254c1eea9ef8485f1a9a2441305ab9434f75108b5f15af342edc422c84a3f183081f37b7ef7dd74984dd812c82efddeb09b8af41e38c8c7512bf7b9687922bde0842f744a95e9930f54711a2f69da34968c4b4a33e6f8cadf537358e9babdd7e65b11d5940c469a8d7ba674a387074216dff7e256e6ff9abe6f225ddb1de8c3473b7adac057412b8edb226fbbd378775fe4eacd34ed7ac6eeb96aa2910c371d816cdcdb9872d46523114dd4c3ca36bdca6c1cc46e335c6b680541a26ba2c279769391bbe396385f763569dec0737597b74c354d89007310cddcd", 0xfd}, {&(0x7f0000002940)="d8f748c048593c1aba9f3763fd808bb6", 0x10}, {&(0x7f0000002980)="8bc546501db13e4ecbdab1500086695106cf1407060ed52660264546f9fc51dd833d4ea52b1a90dba546a7f591f1f85475e21abe254310af3fbe0cdf", 0x3c}], 0x5, &(0x7f0000002a40)=[{0xe8, 0x10f, 0x6000000, "058d352c0ab556b4d8cde16fd7299218ae9577f84097e43dcb52dabc3b2cac3751d60e1ae315250192799581cce77bddcb84a5edcd1ae98544d8daadd705e5ad57a6b1290b3b8e10d6243840dbaa01f3e2498589204fe3691eb92870e4b1d4b48e640bdc1bb3d2ce8059b460e9ecd486ac782954c362b2bd7f6b5bca47f34321ba8a68cd81299ee5957fe0e5de0d021ca23fdd81711d12c1f8516a4626e47ad1de7cfe2acdab790af1e9290eb418a702a4039b58c2783dd7c974460f54dbfe22a5de914194e1b622cd35f72dd856818647112c9c9269"}], 0xe8, 0x8000}, 0x1}, {{&(0x7f0000002b40)=@rc={0x1f, {0x1, 0x401, 0xfffffffffffffffa, 0xffffffff, 0x1, 0x81}, 0x7}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002bc0)="9e0af42ebd4e582116b051594267f1776ffed8cc62546b9fd89d455e81823514b2f5565f6ddc920b1a5e90f4a0841641adc35d0e13ff81bd07ad0c04d2d9031c225e8b5931689c3592bbe1ba7d729c63994aff574189860d278ecc18948cc7b8e91db7f653ca5232ae74a1d057103d0c07a9981e7a70318af68e05e1bcf381e9133285af3d7b922eacd6cdff4f0c558f2ac6d804eab3fb2e7451381fca17360b0958f94de0380965f1fd79797fc7e19e5814a55f41b7c515dbb1", 0xba}, {&(0x7f0000002c80)="c5050fc7782431273ac510bb38026128995893eb7882f27c3cb36ea995d6ae2732b5dabe932ca3e9462699e946824d5b4644", 0x32}, {&(0x7f0000002cc0)="4e8e04ff9de876b198336703583b6e0162b02d9de6825f8e7b3476f994110869e4a57fbdd4c1721c8066614876c69dcf251d135b50bd7c5cda9404ad9dc6f0573bfe55ffce8b608f40abb2c6c726f1ec816aede6c17f7c3b0b43ef85040c3a35d3ec2f37f5d1619c70386f553f7ed27174926ff01efe066825b1555fdfa1752449642da5a1604d9189c6d1e989d28dd39113fc45f4d777c4a9ee6701cb5b96ea376b5c94224357b7125b0f26318dcf0571d9f8ccfd80b895a01b88e9d15e7bed09cd026e9c14410db04b48002196fe410179e5ee30ef699f14d84cb2", 0xdc}], 0x3, 0x0, 0x0, 0x8084}, 0x4}], 0x6, 0x200088c0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x1200008, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'rootmode'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}]}}) alarm(0x5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002f80)={0x2c, 0x4, 0x0, {0x2, 0x1, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r7, 0x4c00, r0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576652d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c0000006a0000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) ioctl$UI_SET_SNDBIT(r6, 0x4004556a, 0x2) setsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000002fc0)={@loopback, r4}, 0x14) 23:57:03 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) r2 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000600)={0x90, 0x0, 0x5, {0x3, 0x0, 0x6, 0x2, 0xffffffff80000000, 0x4, {0x6, 0x3, 0x2, 0x8, 0x200, 0x0, 0x8, 0x1, 0x1000, 0x2, 0x10001, r1, r2, 0x3, 0xde81}}}, 0x90) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe, 0x8001}}, 0x50) setresgid(r3, r3, r3) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000000c0)={0x8, 0x400}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000005c0)="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") 23:57:04 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000180)=0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) r1 = dup3(r0, r0, 0x80000) bind$unix(r1, &(0x7f0000000900)=@abs={0x0, 0x0, 0x4e23}, 0x6e) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:04 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f00000000c0)="5ee8d1972a312fcbcc1a3d0529682817074bd7df291c49712ac73c368b06858244c366d104a67c", 0x27, 0x1, &(0x7f00000002c0)=@ax25={0x3, {"897971e4cfeac9"}, 0xffffffffffff0000}, 0x80) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x482101, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='GPLppp0selinux.\x00') 23:57:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000340)='/dev/keychord\x00', 0xa44, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000180), &(0x7f00000001c0)=0x4) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce65fb0f6e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c94610000000074e81865fe28dfda0000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d1800e965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:04 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) prctl$setmm(0x23, 0x2, &(0x7f0000fff000/0x1000)=nil) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socketpair(0x15, 0xe6971aa9af2daa5e, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x2, 0x0, [0x0, 0x0]}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:05 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x1000000, 0x0, 0x7}}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f00000000c0)=ANY=[@ANYRES16=r1, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX=r2]], 0xfffffffffffffe83) 23:57:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040)) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) fdatasync(r0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) 23:57:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:05 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f00000002c0)={0x50, 0xffffffffffffffda, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:06 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)=""/22, 0x16}], 0x1, &(0x7f00000003c0)=""/53, 0x35, 0x5}, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast1, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r2 = dup(r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000880)={r2, &(0x7f0000000780)="4e56602166cab146db3d10a8e3412e339763579f0cfe5287a1975c2554320225b1f86ca2acdbadc940949582b84ea1dd43b9e9e4bae983cf99c22ffcc8c362882c1124657e03981cb530d15c3729e9e739da38bc13e4920c4ef11b98ecc634dcb9903511d6472a80b60f7dfe85bbf33cb869d7fc4a1e4a1962f244a6a2f29bd9e5149c47bf66ccbbd4746eea6767af362ceeab202148432a85ca57b1df3c18bab76299ba864d25bda4966e32ab03", &(0x7f0000000840)="80b198112dabc5", 0x2}, 0x20) fstat(r1, &(0x7f0000000500)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x200000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:06 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_matches\x00') setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0xe4b, {{0xa, 0x4e24, 0x1f, @mcast1, 0x9}}, 0x1}, 0x90) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e41ae2005ace59f1ffff0d821fe0401a1a1c5bc30800f4e34971dc58b8dc1d54a6c062dde5adc500a48e1c398e26f130b306e83b707a8002948c4af1fb9f64ac187f5ac34c10153ac68c7ea5357b50799b6a34a53c95e76f84285e13bbad32df8288fe64671b0055864f209cb2c4002c3e09d599261bd0a3df58a98756bd78e6c6cf9ad10e2fa253fbb517732219d51978b850452f42db2eb5e6c9ae67734f7990fef094b35f099706d5cbb913dd1328ac6bc2ef71c7792607"]) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r2, &(0x7f00000002c0)=""/9, 0x9, 0x40000001, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f00000000c0)=""/16) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000003c0)=r3) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[], 0x0) 23:57:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) listen(r1, 0x9) pread64(r1, &(0x7f0000002000)=""/4096, 0x1000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x50800, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x600}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1}}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@appraise='appraise'}, {@obj_role={'obj_role'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0#posix_acl_accessbdev'}}, {@audit='audit'}]}}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[], 0xfffffffffffffdd0) 23:57:07 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8000, 0x0) write$P9_RLINK(r1, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) inotify_init() read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {0x77359400}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002840)={@dev}, &(0x7f0000002880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000029c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'dummy0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a40)={{{@in=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b80)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002d00)=0x14, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @broadcast, @multicast2}, &(0x7f0000002e40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000004100)=@can, &(0x7f0000004180)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000004280)={'syz_tun\x00'}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680), &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$binfmt_script(r0, &(0x7f0000000500)={'#! ', './file0', [{0x20, 'user'}, {0x20, 'user_id'}, {0x20, 'nodev'}, {}, {0x20, 'user_id'}, {0x20, 'rootmode'}, {}], 0xa, "a36bbd3c29af8314e254985157246aa6da2a89602eeb134d5f1f2277053f1ee74d39573b81a643ff181a3e2abff7ecf94d163310b14c5880a3dfb2052c17ed1917d3d953efe5697943ac593c676e90425dd28128ba436b1e8f7500a2b934031adc461eec530bf42383aaea4b60dd407e8f1180209523e2df264d6834f716241dd14893368d6b11d40d1cb173f8"}, 0xbe) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298034e00202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891836c571406eb4b673b00000fc0000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f2465c9ebb800088d3d84b83f76656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111"], 0xe5) 23:57:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002600), &(0x7f0000002640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) [ 671.435321] device lo entered promiscuous mode 23:57:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:08 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f00000003c0)={@mcast2, 0x0}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000540)={@loopback, 0x23, r1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f0000002000), 0xa) r3 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000180), &(0x7f0000000040)=0x6e, 0x800) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000340)='veth0_to_team\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) lseek(r2, 0x0, 0x7) write$FUSE_DIRENT(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:08 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:08 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xe5) 23:57:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002340)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:09 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:09 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:10 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 23:57:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = geteuid() r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='memory.events\x00', 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000007c0)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x80400, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffe01}}, {@max_read={'max_read', 0x3d, 0x7ff}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, 'wlan0'}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, r4}}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r5}}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000000066ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50) 23:57:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000e6ffffffff8a000000ce656d316e6f246576656d2400000000000000000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000001f7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000124a000000ffc4664ec3c34d492341b81895af2cabdccbc78be2b02ab2b73bbeaa5f65dfd41b425d185be965566cdf9c051bbff0bf6fb48daaeb342423fcf59f08e3f205456e094c2e4d7d764e2c51e943ac66ee009bb5f111ce000000000000000000"], 0xe5) 23:57:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:10 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffff9c, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) recvmsg(0xffffffffffffff9c, &(0x7f0000000f00)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000700)=""/154, 0x9a}, {&(0x7f00000007c0)=""/110, 0x6e}, {&(0x7f0000000840)=""/50, 0x32}, {&(0x7f0000000880)=""/91, 0x5b}, {&(0x7f0000000900)=""/142, 0x8e}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/195, 0xc3}, {&(0x7f0000000c40)=""/23, 0x17}, {&(0x7f0000000c80)=""/177, 0xb1}], 0xa, &(0x7f0000000e00)=""/200, 0xc8, 0x1}, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8949, &(0x7f0000002100)={'ip6_vti0\x00', @ifru_addrs=@can}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x12010, 0x54f, 0x0, 0x0, 0x8000}}, 0x50) 23:57:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000008b000000000066ce656d316e6f246576656d240000000000000000000000000000002c000000000000619f053823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636700000000000000000000000000000000"], 0x90) 23:57:11 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 859.341945] INFO: task syz-executor1:4028 blocked for more than 140 seconds. [ 859.349314] Not tainted 4.9.130+ #46 [ 859.354083] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 859.362457] syz-executor1 D28488 4028 2107 0x00000004 [ 859.368476] ffff8801ca88af80 0000000000000000 ffff8801d2958000 ffff8801da6b2f80 [ 859.381714] ffff8801db721018 ffff8801d9a976a0 ffffffff827f2d82 ffff8801d6377938 [ 859.390018] ffff8801d9a97650 ffffffff81206c9b 0000000000000292 ffff8801db7218f0 [ 859.398525] Call Trace: [ 859.401125] [] ? __schedule+0x662/0x1b10 [ 859.407220] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 859.414441] [] schedule+0x7f/0x1b0 [ 859.419738] [] ? d_alloc_parallel+0x1041/0x1710 [ 859.426465] [] d_alloc_parallel+0x10a9/0x1710 [ 859.433030] [] ? lookup_slow+0x1af/0x470 [ 859.439027] [] ? __d_lookup_rcu+0x720/0x720 [ 859.445545] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 859.452964] [] ? wake_up_q+0xe0/0xe0 [ 859.458424] [] lookup_slow+0x1af/0x470 [ 859.464323] [] ? set_root+0x430/0x430 [ 859.469997] [] ? audit_inode_permission+0x310/0x310 [ 859.477122] [] ? security_inode_permission+0xc5/0x100 [ 859.485042] [] walk_component+0x822/0xcf0 [ 859.490860] [] ? follow_dotdot+0x200/0x200 [ 859.497099] [] ? link_path_walk+0x954/0x1230 [ 859.503611] [] ? walk_component+0xcf0/0xcf0 [ 859.509602] [] path_lookupat.isra.10+0x186/0x410 [ 859.516381] [] filename_lookup.part.18+0x177/0x370 [ 859.523477] [] ? filename_parentat.isra.16.part.17+0x3d0/0x3d0 [ 859.531203] [] ? strncpy_from_user+0x204/0x2e0 [ 859.537851] [] ? getname_flags+0x229/0x550 [ 859.544077] [] user_path_at_empty+0x53/0x70 [ 859.550154] [] vfs_fstatat+0xc6/0x170 [ 859.555920] [] ? vfs_fstat+0x80/0x80 [ 859.561300] [] SyS_newlstat+0x89/0x100 [ 859.567312] [] ? SyS_newstat+0xf0/0xf0 [ 859.573269] [] ? __might_fault+0x18e/0x1d0 [ 859.579358] [] ? __might_fault+0xe4/0x1d0 [ 859.585499] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 859.592219] [] ? SyS_clock_settime+0x220/0x220 [ 859.598832] [] ? do_syscall_64+0x48/0x550 [ 859.605045] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 859.612183] [] ? SyS_newstat+0xf0/0xf0 [ 859.617823] [] do_syscall_64+0x19f/0x550 [ 859.623816] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 859.630822] [ 859.630822] Showing all locks held in the system: [ 859.637415] 2 locks held by khungtaskd/24: [ 859.641804] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 859.650832] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 859.660813] 2 locks held by getty/2020: [ 859.664872] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 859.674514] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 859.684615] 1 lock held by syz-executor1/4028: [ 859.689374] #0: (&type->i_mutex_dir_key#7){++++++}, at: [] lookup_slow+0x154/0x470 [ 859.699641] [ 859.701273] ============================================= [ 859.701273] [ 859.709155] NMI backtrace for cpu 1 [ 859.712822] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.130+ #46 [ 859.719315] ffff8801d9907d08 ffffffff81b36c89 0000000000000000 0000000000000001 [ 859.727539] 0000000000000001 0000000000000001 ffffffff81098180 ffff8801d9907d40 [ 859.735745] ffffffff81b41d99 0000000000000001 0000000000000000 0000000000000003 [ 859.744056] Call Trace: [ 859.747049] [] dump_stack+0xc1/0x128 [ 859.752584] [] ? irq_force_complete_move+0x330/0x330 [ 859.759345] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 859.765935] [] ? irq_force_complete_move+0x330/0x330 [ 859.772702] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 859.779915] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 859.786950] [] watchdog+0x6ad/0xa20 [ 859.792233] [] ? watchdog+0x11c/0xa20 [ 859.797694] [] kthread+0x26d/0x300 [ 859.802915] [] ? reset_hung_task_detector+0x20/0x20 [ 859.809589] [] ? kthread_park+0xa0/0xa0 [ 859.815223] [] ? __switch_to_asm+0x34/0x70 [ 859.821195] [] ? kthread_park+0xa0/0xa0 [ 859.826825] [] ? kthread_park+0xa0/0xa0 [ 859.832519] [] ret_from_fork+0x5c/0x70 [ 859.838128] Sending NMI from CPU 1 to CPUs 0: [ 859.843269] NMI backtrace for cpu 0 [ 859.847193] CPU: 0 PID: 4024 Comm: syz-executor1 Not tainted 4.9.130+ #46 [ 859.854204] task: ffff8801a3f88000 task.stack: ffff8801d6370000 [ 859.860320] RIP: 0010:[] c [] __lock_acquire+0x264/0x4a10 [ 859.869130] RSP: 0018:ffff8801d6377180 EFLAGS: 00000802 [ 859.874739] RAX: ffff8801a3f888d8 RBX: 0000000000000050 RCX: 0000000000000000 [ 859.882038] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffff8801a3f888f8 [ 859.889346] RBP: ffff8801d6377328 R08: 0000000000000001 R09: 0000000000000001 [ 859.896704] R10: ffff8801a3f88000 R11: 1ffff100347f111f R12: 000000000000046a [ 859.904063] R13: 0000000000000002 R14: ffff8801cfd24a08 R15: 0000000000000000 [ 859.911397] FS: 00007fa94389d700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 859.919625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 859.925505] CR2: 00007fa0a8667000 CR3: 00000001d7531000 CR4: 00000000001606b0 [ 859.933044] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 859.940316] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 859.947583] Stack: [ 859.949791] ffff8801a3f888b0c ffffed00347f1115c ffff8801a3f88000c dffffc0000000000c [ 859.958016] ffff8801d63771f0c ffffffff812068a7c 0000000000000000c ffff8801a3f888a8c [ 859.966299] 0000000600000007c ffff8801a3f88000c ffffffff83cdeaf0c ffff8801d2958000c [ 859.974523] Call Trace: [ 859.977102] [] ? mark_held_locks+0xc7/0x130 [ 859.983223] [] ? trace_hardirqs_on+0x10/0x10 [ 859.989338] [] ? mark_held_locks+0xc7/0x130 [ 859.995305] [] ? finish_task_switch+0x1ed/0x640 [ 860.001619] [] ? retint_kernel+0x2d/0x2d [ 860.007323] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 860.014243] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 860.020952] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 860.027700] [] lock_acquire+0x130/0x3e0 [ 860.033320] [] ? prepare_to_wait_event+0x6e/0x8c0 [ 860.039811] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 860.046732] [] _raw_spin_lock_irqsave+0x4e/0x70 [ 860.053045] [] ? prepare_to_wait_event+0x6e/0x8c0 [ 860.059533] [] prepare_to_wait_event+0x6e/0x8c0 [ 860.065848] [] ? finish_wait+0x290/0x290 [ 860.071619] [] ? __might_sleep+0x95/0x1a0 [ 860.077474] [] request_wait_answer+0x22e/0x820 [ 860.083704] [] ? flush_bg_queue+0x3f0/0x3f0 [ 860.089760] [] ? autoremove_wake_function.part.0+0x130/0x130 [ 860.097402] [] ? __fuse_request_send+0xfe/0x1b0 [ 860.103779] [] __fuse_request_send+0x109/0x1b0 [ 860.110093] [] fuse_request_send+0x5d/0x70 [ 860.116023] [] fuse_simple_request+0x2f4/0x660 [ 860.122337] [] fuse_lookup_name+0x253/0x5d0 [ 860.128397] [] ? fuse_valid_type+0x70/0x70 [ 860.134414] [] fuse_lookup+0xf3/0x3b0 [ 860.139859] [] ? fuse_lookup_name+0x5d0/0x5d0 [ 860.146025] [] ? __d_lookup_rcu+0x720/0x720 [ 860.151994] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 860.158804] [] lookup_slow+0x24a/0x470 [ 860.164425] [] ? set_root+0x430/0x430 [ 860.169988] [] ? audit_inode_permission+0x310/0x310 [ 860.176652] [] ? security_inode_permission+0xc5/0x100 [ 860.183491] [] walk_component+0x822/0xcf0 [ 860.189284] [] ? follow_dotdot+0x200/0x200 [ 860.195230] [] ? link_path_walk+0x954/0x1230 [ 860.201406] [] ? walk_component+0xcf0/0xcf0 [ 860.207662] [] path_lookupat.isra.10+0x186/0x410 [ 860.214164] [] filename_lookup.part.18+0x177/0x370 [ 860.220918] [] ? filename_parentat.isra.16.part.17+0x3d0/0x3d0 [ 860.228560] [] ? strncpy_from_user+0x204/0x2e0 [ 860.234787] [] ? getname_flags+0x229/0x550 [ 860.240666] [] user_path_at_empty+0x53/0x70 [ 860.246634] [] vfs_fstatat+0xc6/0x170 [ 860.252143] [] ? vfs_fstat+0x80/0x80 [ 860.257649] [] SyS_newstat+0x86/0xf0 [ 860.263079] [] ? SyS_fstat+0xf0/0xf0 [ 860.268441] [] ? __might_fault+0x18e/0x1d0 [ 860.274323] [] ? __might_fault+0xe4/0x1d0 [ 860.280116] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 860.286523] [] ? SyS_clock_settime+0x220/0x220 [ 860.292912] [] ? do_syscall_64+0x48/0x550 [ 860.298711] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 860.305608] [] ? SyS_fstat+0xf0/0xf0 [ 860.311060] [] do_syscall_64+0x19f/0x550 [ 860.316771] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 860.324004] Code: c01 c44 c89 ce8 c48 c8d c1c c80 c48 cc1 ce3 c03 c45 c85 ced c74 c4c c48 c8d c44 c1f cd8 c48 cbe c00 c00 c00 c00 c00 cfc cff cdf c48 c8d c78 c20 c49 c89 cfb c49 cc1 ceb c03 c<41> c0f cb6 c34 c33 c40 c84 cf6 c74 c0a c40 c80 cfe c03 c0f c8e c99 c13 c00 c00 c0f c [ 860.357923] Kernel panic - not syncing: hung_task: blocked tasks [ 860.364101] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.130+ #46 [ 860.370785] ffff8801d9907cc8 ffffffff81b36c89 ffffffff82a783c0 00000000ffffffff [ 860.379001] 0000000000000000 0000000000000001 dffffc0000000000 ffff8801d9907d88 [ 860.387344] ffffffff813f6835 0000000041b58ab3 ffffffff82e297ab ffffffff813f6676 [ 860.395489] Call Trace: [ 860.398083] [] dump_stack+0xc1/0x128 [ 860.403453] [] panic+0x1bf/0x39f [ 860.408547] [] ? add_taint.cold.6+0x16/0x16 [ 860.414526] [] ? ___preempt_schedule+0x16/0x18 [ 860.420763] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 860.428134] [] watchdog+0x6be/0xa20 [ 860.433416] [] ? watchdog+0x11c/0xa20 [ 860.438873] [] kthread+0x26d/0x300 [ 860.444098] [] ? reset_hung_task_detector+0x20/0x20 [ 860.450853] [] ? kthread_park+0xa0/0xa0 [ 860.456483] [] ? __switch_to_asm+0x34/0x70 [ 860.462548] [] ? kthread_park+0xa0/0xa0 [ 860.469394] [] ? kthread_park+0xa0/0xa0 [ 860.475024] [] ret_from_fork+0x5c/0x70 [ 860.481265] Kernel Offset: disabled [ 860.485139] Rebooting in 86400 seconds..