0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='a'], 0x1) dup2(r0, r2) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r4, 0x0, r1, 0x0, 0x80000000, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) gettid() r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) poll(&(0x7f0000000000)=[{r5}], 0x1, 0x0) 20:12:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 262.248408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:12:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = accept$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_team\x00', 0x10) r2 = dup3(r1, r0, 0x80000) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpu.weight\x00', 0x2, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r2, &(0x7f0000000440)={0x71, 0x7d, 0x1, {{0x0, 0x52, 0x50000000000000, 0x1, {0x88, 0x3, 0x6}, 0x0, 0x40, 0x1, 0x1, 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00', 0xb, 'cpu.weight\x00'}, 0xa, '/dev/zero\x00', r5, r6, r7}}, 0x71) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x102fff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)) dup3(r0, r4, 0x80000) 20:12:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:01 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x80, 0x2) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000400)={&(0x7f00000003c0)=[0x5, 0x9, 0x7], 0x3, 0x80, 0x100, 0xdf, 0x1, 0x8, {0x4, 0x1f, 0x823, 0x180000, 0x1, 0x0, 0x7, 0x3, 0xc07d, 0xffff, 0x80000001, 0xdca, 0x2, 0x7, "3ca8654615ae5c2606be85db50aaefff9d1d701845a56a0c58e6885b4f94c8cd"}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x454a00, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64613d3030303030087e9e96a468ea30b2775642083d8a2eca253caf30303030303030303030303030302c757365725f69643d41bc31901ff92e83cc5c2cdd0b767b5910f948b0df19ceac442e781c6e8b2d7f0eedf67adbcb4f83d56a220246f992f1ca9f319c184a5655d9b9f1fb53b1d47af6420c7a206c3d9923022a1c78ff9531", @ANYRESDEC=r2, @ANYBLOB=',g}oup_idO', @ANYRESDEC=r4, @ANYBLOB=',max_read=0x0000000000000001,rootcontext=staff_u,appraise,\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r6 = getpgid(0x0) openat$cgroup_type(r1, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) write$FUSE_LK(r1, &(0x7f0000000500)={0x28, 0x0, 0x6, {{0x7ff, 0x9, 0x3, r6}}}, 0x28) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='fd?', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="fcffffff705969643d", @ANYRESDEC=0x0, @ANYBLOB="2c005c2887773bc6ad5679e723b4dc9b09927808f69367a316a440000000dd415d70da452f4b4d949d8a28b3ee1645c49856674eeb9cdc0d8fbce60243e09560ea93f825bc8d4696b7487b8c63456cd184781b0f61dca287240fbd1ef8de6888ff5c19545c7d35a4b87e39d42d2adfb18eb88d351852635eb7bc856f796b6f8f0ea2433cac03a6752db3defd890aef54d0e44b2fa87df4e66256a7f623ed1872dea3c258a4b02f3af3c6f3f79fd296885c714ed4cd71d1e3c8dab590df43a7c65999b029888a141ecf79c7860b6fb3008cb8801ff637193051cde2ea0bb3cdd0a4d330dd790ddaf3"]) pread64(r5, &(0x7f00000001c0)=""/84, 0x54, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x6}, [{0x2, 0x0, r2}, {0x2, 0x7, r3}, {0x2, 0x0, r2}], {0x4, 0x3}, [{0x8, 0x2, r4}], {0x10, 0x1}}, 0x44, 0x1) write$FUSE_INTERRUPT(r5, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7) 20:12:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7) 20:12:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000140)={0x2}) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x250, 0x800) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7) 20:12:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x20000000800040, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67727f75705f69643d", @ANYRESDEC=0x0, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYPTR, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32, @ANYPTR64, @ANYRESDEC=r0, @ANYRES64=r0]]]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x6, 0x1, &(0x7f0000000740)=[{&(0x7f0000000640)="79d25f6e02ba38475cd1fe4515e68be58551c9f1254a065f272f6cfec5ca6bef32b7caf1cc9fb82ea3d87fc32429a6caca3902ee8112e9a20f182adcd557f38c847067da36be9d0f239caf3ffe17e6f5488b7e278cc0fb10d24f66637ab04e2decd30ebfbb44161e180aba34ab25688d5db258d3c314edcd0aae8c0505dbbc24364b8c4b0ca0ed565b008b6e0746eb81bbc5f81480e487b32bf13cff985a148482a01783cc3b103c88123dc60dc3d44ca18cea5f80f51d732a2563a7af23373064c0a15f4ef3f3243bf28f168c3f88409680216561626ae29283103074cf95872dff106106dba03395b7fa7459750f18c9d9d7d9", 0xf4, 0x7fff}], 0x400, &(0x7f00000008c0)={[{@quiet='quiet'}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/dsp\x00', 0x200500, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000940)={0x1, [0x7]}, 0x6) pread64(r0, &(0x7f0000000400)=""/84, 0x54, 0x0) fgetxattr(r0, &(0x7f00000003c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000500)=""/215, 0xd7) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) write$selinux_context(r3, &(0x7f00000000c0)='system_u:object_r:autofs_device_t:s0\x00', 0x5) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0xc) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) ioctl$sock_ifreq(r3, 0x897f, &(0x7f00000001c0)={'rose0\x00', @ifru_flags}) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x8, 0x600) [ 263.553401] hfs: unable to parse mount options 20:12:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) [ 263.642650] hfs: unable to parse mount options 20:12:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=""/172, 0xac) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:02 executing program 5 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = geteuid() r2 = getgid() write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0x0, 0x3, {0x1, 0x3, 0x2, 0x0, 0x400, 0x4728, {0x6, 0x5, 0x2, 0x44e6, 0x10000, 0x2abe, 0xd9, 0x8001, 0x6, 0xfffffffffffffff9, 0x3, r1, r2, 0x3, 0x6}}}, 0x90) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4080"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0x2f) 20:12:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x1dcfabfabf5f5426, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, './file1\x00'}, 0x6e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f17746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) truncate(&(0x7f0000000080)='./file1\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0xd7}, @window={0x3, 0x1, 0x9}, @timestamp, @sack_perm, @sack_perm, @window={0x3, 0x8, 0x401}, @timestamp, @window={0x3, 0x5, 0x2}], 0x8) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) fcntl$setflags(r1, 0x2, 0x1) 20:12:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x0) 20:12:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0x20000167) 20:12:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) execve(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000480)=[&(0x7f00000000c0)='group_id', &(0x7f0000000100)='.usermd5sum\x00', &(0x7f0000000140)='vboxnet1\'lo\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='system\x00', &(0x7f0000000340)='group_id', &(0x7f0000000380)='\x98GPLnodevwlan0em0bdev@bdev^,\x00', &(0x7f00000003c0)='/dev/fuse\x00'], &(0x7f0000000740)=[&(0x7f00000004c0)='rootmode', &(0x7f0000000500)='self+\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='rootmode', &(0x7f00000005c0)='/dev/fuse\x00', &(0x7f0000000600)='fuse\x00', &(0x7f0000000640)='group_id', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='group_id', &(0x7f0000000700)='cpuset+vboxnet0\\\x00']) 20:12:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:04 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffff800, 0x1) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000002c0)={0x0, 0xada, 0x5, &(0x7f0000000240)=0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x145100, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@nat={'nat\x00', 0x1b, 0x5, 0x650, 0x248, 0x338, 0x338, 0x110, 0x248, 0x580, 0x580, 0x580, 0x580, 0x580, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x10, @ipv4=@broadcast, @ipv4=@rand_addr=0x7f, @icmp_id=0x68, @port=0x4e21}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff000000, 0x0, 0xffffffff, 0xff], [0xff000000, 0xffffff00, 0xff, 0xff000000], 'batadv0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x0, 0x400, 0x5, 0x4}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x10, @ipv6=@ipv4={[], [], @empty}, @ipv6=@mcast2, @gre_key=0x80000001, @port=0x4e21}}}, {{@ipv6={@ipv4={[], [], @loopback}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff0000ff, 0x0, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0xffffff00, 0xffffff00], 'tunl0\x00', 'hwsim0\x00', {0xff}, {0xff}, 0x11, 0x9, 0x3}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x100000001, 0x10001, 0x4}, {0x7de, 0x3, 0x4}}}}, {{@ipv6={@empty, @ipv4={[], [], @remote}, [0xffffff00, 0xff, 0xff000000, 0xffffffff], [0xffffffff, 0x0, 0xffffffff, 0xff000000], 'nr0\x00', 'ip6erspan0\x00', {}, {}, 0x1d, 0x1, 0x1, 0x6a}, 0x0, 0x200, 0x248, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x4, 0x1f, 0x101, 0x3, 0x3d, 0x6, [@local, @ipv4={[], [], @multicast1}, @loopback, @rand_addr="c17d5f452b90ff2d8b670392aa8dbe18", @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @broadcast}, @local, @dev={0xfe, 0x80, [], 0xf}, @ipv4={[], [], @broadcast}, @dev={0xfe, 0x80, [], 0x29}, @rand_addr="2ebbe8c8f59a1088af97b25408cbe83b", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @rand_addr=0x4}], 0x2}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv4=@broadcast, @ipv4=@local, @gre_key=0xce2, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dfcc816c6eade010c2e9275aaa1d81f5c62ef2c95e033535b38b8ed8aaa70", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x20000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x7219, 0x8000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="7f59"]) fcntl$setlease(r2, 0x400, 0x2) pread64(r2, &(0x7f0000000340)=""/84, 0x54, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x108010}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x68, r3, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6ea20013}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x10) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000240)=0x56) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0xfffffffffffffffc) read(r2, &(0x7f00000000c0)=""/167, 0xa7) 20:12:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x0) 20:12:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0(000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f0000000340)=""/167, 0x162492f504741218) 20:12:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) openat$cgroup_type(r1, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "039253464bb0a7269181a935dfc5c4d5"}, 0x11, 0x1) 20:12:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303830303030303030303027305f69643d40000000000000800000000000000f821bdb4c557995d2de9eb48741a115292f4b35d9257ba7726af81b87206f05af29790a3b270eeb6941296e2321c283bf0b9e6e328ffbbe92c5e8cf5544e61476d5272a3144be8cd41e16e1d3a59ef596e97e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000600)=""/84, 0xffffffffffffffdf, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d343ae3a1f5d58f387569f5247d8bd4cb35be19c776ea5c058fe455b343455e4c6b0206b98a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x3}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000480)="9ae655f4640c9e010fe0b939196e8da703985b279cea75145558c889100c45b36f8c0b2a6f704d37199f1964a3359447cb1991f7b084d8bb26f706dc2db1744b9757e9ce1cdff569e8888523a5a1c2009aa72b2d039591eed3f4c09ce70e8f1cee2fa484eceaaff27bc745e5d0dad45fca3f66a5221cbb50b9207d16ab28b8fd2c0800268f052c9569c306f2f2b79d7407aaad79c67ca1ebeb9f5208c43818d5442f6c3eb0e387d524141c4bf244a1344bd5f3aaa3a907b4f7cff19415b73aeabcd4bde5fc7850d8585d39c0b37de612eee78a1ef6cbea520273b2f0b625d5357c0e0d84b4", 0xe5}, {&(0x7f0000000580)="1edd89f57861da2584acfc03197db88b6b26616b8b7219c8a1fc580dae35bd67ced67fa8eec1ef33fa8763ee19044138b74c6946b0a6f830ded04fb7864ebf10dff985af00378ae1dd144b97b400c2c3be610fc5c7ac831ada29d12fbf508b8b7aa144e4e60433690037f5fe9348896e8a6fee4df9150b8b9a241fd8e3c042968615a5cf3a34559c212d298191c32002257b304f3d397ca27b072e4a24856527c52aa8e92de98723a22f9a546ddab5d3bbfa45b027d17d624a4e3f52dc588103545185c7f2", 0xc5}, {&(0x7f0000000100)="1d5036c4a2bbd9e6d107ab794f71", 0xe}, {&(0x7f0000000340)="45e475c67ef55d2d8da2d033c93e7b8bd2fdedebaca1cae2938447ac1dbf0f8112094ca1b5d688c13503aeaf48eabd04d152f3982b2f51f0502147824c80f00757529bf9b06736f5c823195c57da3b99b46cbb848b86b8f293c7634f1b239b5845bc3c1394acb4a3b068", 0x6a}, {&(0x7f0000000140)="a31dba882a61bdbf58045cf7b62ee8c139d53f03e4b2aca8cebd4089491d00", 0x1f}, {&(0x7f0000000680)="cc70dd9f0eceef4247c0fb9a155be9cd4f552c5a0a324a984f44a808bb87bd0e24f54bbbc359d597ef4e9fb5dc7fe8c5282d5798f2defb3aa23edfd385d18148bc0cffdfcffd418b1ecb07d69ba2351f7b8cfeb63462439d5b411dea51ead21709757c42e76d4755f714ed6cd681d8063ec2d422ae51ad54ad17ed7c5423d1a209d1ea079181cfaf7eaba34df8ecc66b838cf98cf217410b8de98576ff4a92c6ba2e8bcfc943a1c228133dc7e7c71e2fec710f02d7200053650c9b138c2381ccc6fa02f54400645e06e65c38d09741970f57996933d563df152b547ae0362d1283e363b208fde7af2855a11e163b551f2bc70ddebbe68576e1", 0xf9}], 0x6}, 0x40) 20:12:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 20:12:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x0) 20:12:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x1ff, 0x111000) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000280)=0x1, &(0x7f00000002c0)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x8, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x800, 0x0, 0xff, 0x0, 0x0, 0x8}, 0x20) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000a80), &(0x7f0000000a40)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000580)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000800000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@in, &(0x7f00000001c0)=0x80, 0x800) fstatfs(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000005180), 0x1000) accept$inet6(r5, 0x0, &(0x7f00000002c0)) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) 20:12:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 20:12:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='/dev/fuse\x00', 0xa, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1824"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xffffffffffffffda, 0x6}, 0x14b) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 20:12:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:05 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2000, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x240800, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xe97, 0x40) creat(&(0x7f0000000240)='./file0\x00', 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x40, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x300, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x4000002) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000bdd1ce0d4a8e17ff5c756c3c284e5f032a04cd6a9de428a12b1efa34674465e6cf54d3cfdd662ab5d0c64caa381c0f8df7a894d92694d136800f699b1ee16667a8ebfd05d299ad4815f98167284b46f513adda3084ffd63c7f2235b2bdb006d25b1186ea8563ecec11ab70c8743a5d92eca8b790020f12cd690d448515d59f46739a730198a046ae248c300468de86a8e42b03506700f959f07ebbada9610c75c6032e6e7b11b4ee15d4d700ad979b290207bb522c6a550e1d62e001175b842851e02ab8057fa1e82911f057da0b000eb24daaf17952d2722409d46a926187c6ac48a4e661263b9f"]) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:06 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) write(r0, &(0x7f00000002c0)="2ec365ddb31de02d2130ba84e48578ea0d3051a5ab443d5d16aa66095d826409c1408c01151bcd1cda9e7d65dd3f2a56", 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000240)={0x3, 0xac99, 0x9, 0x94}, 0x10) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) ftruncate(r1, 0x20) 20:12:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10}, 0x10) 20:12:06 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="6c726f6f746d6f64653d3000003030303030f8cbc5c8e57f046c9c0c4d92c6f33030303030303030d53034303030302c755e56ca589c31afb4c4616deb1c7365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000400)) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000002c0)={0xc81, &(0x7f00000004c0)="22289826a1671d7d1cd355812a618bae8381362d4854663f48de02e60f609f875e62f35134cc811cf16210523b69a22bf47c9a5e7b7e39e3f5df7dd7443ae4ddf9d17df0a45e748d5403b9a50c256b0790c0ed8240ca11e529eeb4cc298d57e7fd2edc790bc32b7d941297c4c7be4c279d7d7f1ab1d5928f8ff881b696279e8211648cc2443b46d3af7fb63c7a321dfbd50ba27504cc070f6814"}) mknod(&(0x7f0000000240)='./file0/file0\x00', 0x8010, 0x40) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x0, 0x15, 0x1f}) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10}, 0x10) 20:12:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/19) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1000010003, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000480)=""/4096, &(0x7f0000000380)=0x1000) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x6, 0x0]}, &(0x7f0000000140)=0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f0000001480)=""/167, 0xa7) 20:12:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10}, 0x10) 20:12:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c202c8bbb933e8eece0", @ANYRESDEC=0x0, @ANYBLOB=',@']) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x101040) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000b80)=0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000340)=0xc) sendmsg$nl_netfilter(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000480)={0x610, 0xd, 0x5, 0x301, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x2}, [@typed={0x8, 0x6b, @u32=0x1000}, @generic="0adaef2abbdccf57397c43b92cb3583ed491507343aad4a2b02dda0a40f9f2d8c302d2622c308c3215b53bc901df8954e600c9a659eff7077bfa5e1784", @typed={0x8, 0x95, @ipv4=@rand_addr=0x5}, @nested={0xc, 0x30, [@typed={0x8, 0x71, @fd=r0}]}, @nested={0x2d4, 0x46, [@generic="c7a7f3ab35e2b6b0fb922cd7db6a9f5467a5d3c12627627cf6d7f179898d9e6cdb07f2465d37f991b3d169ed7212a45d3f8de8c8", @typed={0xf0, 0x5c, @binary="2f96c29e17da6bc1d202fe26a334e13dff87838e8855d1ca7c54e279ec4e1be93a9c0d000b6562a81988e05e4d015ec7e28b771cab78f7a15fd83ddff566e26608d728d3189d9adb2c79c615ef1f28ba8b0ae516db7ab3a8e858c1b1aa1855cd5a142db0d145cd167ec57c7afd0fbc4f5184423c6f7ac257fb5a45c5170f7bba38a4ff01d698cf1728af8a5092ab26d0920abdb53e7384ad590d36c7ecf3e4cb0ab7764704d3ef04c1044de4b7aa4781c6e03ce35af22473a7ead85b2a833e39e2733f776c0b169396ce0ce2d939caa4f2a64439f21e1135bf650df5da36788926c14752bd59f20cf263"}, @typed={0x8, 0x51, @u32=0x54}, @typed={0x8, 0x1d, @pid=r2}, @typed={0xc, 0x6a, @str='fuse\x00'}, @generic="f67b65ef0aa253f344bb57c6cf04ae3d72cb04268396d31342aa54491f84ea43363537a3b54b1c46d63c7429ef7ea9b33ff5b74498fdeeea839df2468be9fb42eff71f6b6394281ae81533d2feb6f7b3ae45cca6aa3674bd6dd7da9598d06b5e1566e2ac62f868db7330590e4c6890c28c0bac9a2ae44773d8ff5639c512a9da5f232c247a625f467bfc4cfa558bf9fe765bc531efa6f9e13124d42b288004be7a9710e81b1216547f8d2f95d4a181f518541d5b023cb4d56ca7f83d2b48d1980ec1628db0a4", @generic="28ea258d301e7d913968352de5bc13be3cad1ba214f3163bcc6bd94fd6184d20b317d813fd79f29a242f20c75eeaf4df677392354ee9c108ba99304568057de578c32c224087f2f3ce56d08e5e09f8c605e17e294cfb862fec5491c5f071db0689078c43b138bbac24a84948138aa92f9fb14df74b3cf5a69c8fa2742fc08c015d09b3198ee721e624d85d6bea18b6a33de7fd4f539970a0fc60b5e14643", @typed={0x8, 0x3, @pid=r3}, @generic="a570b7f3ee12a2010d1b8c769a31663fd9bfca7e4be7af85487621f5b0f5e3ae4daba98f"]}, @nested={0x21c, 0x86, [@typed={0x8, 0x4a, @str='\x00'}, @typed={0x8, 0x25, @u32=0x3dc}, @typed={0x8, 0x3f, @fd=r0}, @generic="718c12ad987f9a66e669851e3440e45b0418922cb1dca762d8cde513eca03012fca813d78b7ffdd6d41c1d6369023a9e6160ea7d0729045bcb9b42843e23ecac3f70038af9ec884d7ccc2a46dff650a55cb61ff7ed718d4984242ba37ba0c6740674", @typed={0xc, 0x2d, @u64=0x9}, @typed={0xc, 0x23, @str='^/.:+\x00'}, @typed={0xa8, 0x8c, @binary="22e44cb55a861f1d1d59079963e600e3ba7af5ab3346c0fb16187917d8e4656f38871090eb91b87fbd261b6281c9b6e9eaae7cd79f308c54c8aeabda61fbf175365bc9ffc241808d0c8aba154c12e59e36b658a27ac9841d089cef21f17452b9c1f9bcdb1a14b6033f3d220fb6324557de62967f01dd6ed90c02237899dd412eb60edb39c58c28ecbd5431e165dc6fdece2effb784928ad8a8ac2d00f3ee293a7965a5b6"}, @generic="5928a950fa9c698c", @generic="e2e03a4b685a2917290b05dfb6346074c4b3646499643a9a0265a484509005f251b91394b98bcdc0dc2647a62bbd48cf1b564090bd", @generic="dc743e7bc8b2457a2be7c80606de79edd9c86c49acf31ca24109b8a46253792d03fd84c0f79035e8d4bd90600f26aa610a3f55100ba82d028e805563e672480d63b60c7f80f512adb6d01dedefc232d6b4028367ed8f475599958e436e73521702444b01f8512b18a20c748b15ba0fbbaa6adff929aa48c4a3c92601b5ac1776c19492a86840cb64fbc9f6a78a5035a57cfcce80b1913f8ee7def522d21e"]}, @generic="7124426df3c14212afe378031ad667432e602166c43e08ce550a488cda6039da14470016f8110d0be16cbd0f80698f84231dc7237431f0f04452c75d15f3a8b290f16e64d568a0581fb77cf6c5151741653d726a637ca52264b5bca790174dbeb2fb64c48e274a0ab9b8a17b3a9c42a3373fd9bd4df06967d826380990d7667527453873f2d212f2e7656fc35a40eabb4c81a9eb9b0cd6ae48c30555bc0557b61746e23813659a4e3fd676e94f00d48a"]}, 0x610}}, 0x20000080) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000ac0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80981, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x8, 0x2}, 0x14) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) 20:12:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x8, 0x0) r3 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x800, 0x0, 0xff, 0x0, 0x0, 0x8}, 0x20) getxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000a80), &(0x7f0000000a40)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000580)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000800000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@in, &(0x7f00000001c0)=0x80, 0x800) fstatfs(r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000005180), 0x1000) accept$inet6(r5, 0x0, &(0x7f00000002c0)) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) 20:12:07 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x50800) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f00000000c0)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) rt_sigreturn() 20:12:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fg=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0xe3dd74719b3a5cf4,default_permissions,allow_other,default_permissions,default_permissions,\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000140)={0x4, 0x20, &(0x7f00000000c0)="f222c0a06a1716214c6d339d1be343d91eace068b41a47f9a742ac5038927c5ca7f63f944f3c444eb1a1249e3df3cc001bc4c1faa4e3ec3c3fa1ccd88c82d249a1238f9332a800717b06fb6dd36697c5564bffd3fef5434f5fd1d139f18d5e8fc1dd7d90237ce27dfebd71a080e381", {0x81, 0x2, 0x48524742, 0x0, 0x2, 0x8, 0x0, 0xfc53}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="525ca2ba5393", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group~id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000240)={0x8001, 0x9}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000002c0)=0x2) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x1ff, 0x111000) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000280)=0x1, &(0x7f00000002c0)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000240)={0x18, 0x1, 0x0, {0x7}}, 0x38b) 20:12:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:08 executing program 1 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0x10) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) 20:12:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x7, 0x79, 0x2}, 0x7) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x70, 0x5597, 0x400, 0x1, 0x10001, 0x0, 0x1f, 0x1000, 0x8, 0x200, 0xa11a, 0x10001, 0x4d0, 0x3, 0xc0b, 0x0, 0x3ff, 0x100000001, 0x0, 0x5, 0x3ff, 0x5, 0x7ff, 0xffffffff80000000, 0x400, 0x10000, 0x80, 0x10001, 0x3ff, 0x5, 0x6, 0xfffffffffffff801, 0x2, 0x4, 0xffffffff00000000, 0x4, 0xd2, 0x0, 0xfffffffffffffffe, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x8, 0x6, 0x5, 0xf, 0x9, 0xfffffffffffffffa, 0x8}, r0, 0xffffffffffffffff, r0, 0x3) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67720800705f69643df039b9dd38a183f45d87d620be4320a7a68dcef1c5122a2dc2a31d2ad8a9c9e54c496c1a14fc9f9432fdde9512b65815468941b80baa124252d0cf57ae8fb86b7b352d64c98013b8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') 20:12:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xf, 0x0, 0x3}, 0x10) 20:12:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x84400) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) bind$packet(r1, &(0x7f0000000140)={0x11, 0x11, r2, 0x1, 0x7f6, 0x6, @local}, 0x14) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) fstat(r0, &(0x7f0000000340)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x5}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfdef, 0x0, 0x3}, 0x10) 20:12:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000100)=0x453, 0x2) 20:12:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x20000190, 0x0, 0x3}, 0x10) 20:12:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0x0, 0x3, {{0x2, 0x1, 0x6, 0x3a9, 0x3, 0x5, {0x6, 0x10000, 0x8, 0x3, 0x4, 0x1, 0x10000, 0x246, 0x1ff, 0x200, 0x9, r1, r2, 0x8, 0x8}}, {0x0, 0x1}}}, 0xa0) 20:12:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfffffdef, 0x0, 0x3}, 0x10) 20:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x800, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4000, &(0x7f0000000400)=ANY=[@ANYBLOB="801900", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfffffffffffffdef, 0x0, 0x3}, 0x10) 20:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:12:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x8, 0x3}, 0x10) 20:12:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d616b5d1a9c7f5732d18174f22b13d4f84cab295c0a30d898e1a2d3f44f9d552f4b41462784097ec92f4119e6c87cf7a90034eb85ac4ef2aff0a07d86085202535b859883fc20592804bb6ab8adfda165b979fd090489cf890503703eab3601896e4baba82102a680eb97ff434cf5ccf657b02a8d8b32013c685dbe0483", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x10) ioctl$VT_WAITACTIVE(r1, 0x5607) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0xfffffffffffffffd}, 0x28, 0x3) 20:12:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:12:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x10, 0x3}, 0x10) 20:12:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:12:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f653d30303030303030303030303030303030303034303030302c030065725f69643d0000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fchmod(r0, 0x200000000000083) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x100, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40000, 0x0) connect$netrom(r1, &(0x7f00000000c0)={{0x3, @bcast, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) 20:12:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = fcntl$getown(r0, 0x9) sched_getparam(r1, &(0x7f0000000080)) 20:12:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x8000000, 0x3}, 0x10) 20:12:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x200) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000240)=0x9008000) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x10000000, 0x3}, 0x10) 20:12:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0xfffffffffffffffc) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000340)={0x2, 0x0, [{0x80000019, 0x40, 0x2, 0x3, 0x8001, 0x9, 0xfab6}, {0x1, 0x8, 0x5, 0x3, 0xfffffffffffffbff, 0x5, 0x6}]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200240, 0x0) 20:12:11 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:11 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:11 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000080)={0x872, 0x5}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) read$alg(r0, &(0x7f0000000340)=""/79, 0x4f) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) dup2(r1, r0) fallocate(r1, 0x0, 0x7, 0x2b23) 20:12:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xdaffffff, 0x3}, 0x10) 20:12:11 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$RTC_WIE_OFF(r1, 0x7010) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) timerfd_create(0x7, 0x800) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xf5ffffff, 0x3}, 0x10) 20:12:12 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d83f07f628e7bf72bcfface6ee8dcc37151b8dabf5854ade119f326de0b31b71c1128d06617680bc62e913d3bc5b5d4d8240a62f1fb9764088864c9854c43cbe0458627fe3191d51892fe7fa5fbec99b3bebd1a441de80ca8b3bd654255a25de8e8c67451a695b4c5bcde453296b87c1a9b2504996cd7f4f15e337458212247b500000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x0, {0xcd, 0xed0}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f0000000340)=""/167, 0x15) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 20:12:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:12 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x282080, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:12 executing program 3: personality(0x5000007) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000L40000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xffffffda, 0x3}, 0x10) 20:12:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000380)={0x5, &(0x7f0000000340)="7800a7623dda404e991e5524e56bd214d51499ebde83325e835fc02be1fea1e47c878e3428e9cbacf9a3"}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x82080, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000240)) 20:12:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:13 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r3, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x800000000000000, 0x3}, 0x10) 20:12:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3c25040fda8662ee035b496652972bcb30e5b48feeb9748452230c8b78880bd0c9edba2ef96f7bf1c2c64307c42ad623ecc373dce61069c21a236d6a7cc83914e36f23a323872a4800b2d1263d5c04670f9a165553329672758cb9150ac7f9969b25b72fc8002ee1edab51d8a3544fd6f0329b87593cfc7c0617285c5ad90d3a4461c5aa62574a2c9b5a6595ac1441a08a8cf3072e0fb6f3f9e940cb176b003fb3b15b081af0bf9abb81f39926eba8674d986f8ad04ecc508201506f80d13c2a6d"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x480400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000002c0), &(0x7f00000003c0)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x1, 0x8000, 0x5, 0x200, 0x0, 0x3, 0x2000, 0xe, 0x400, 0x0, 0x3, 0x1, 0x7, 0x5, 0x5ed, 0x7fffffff, 0x80000001, 0x0, 0xffffffff, 0x101, 0x20, 0x0, 0x126, 0x9, 0x0, 0x6, 0x7, 0xfffffffffffffff8, 0x1, 0x6ec2, 0x3, 0x1, 0x8c, 0x8, 0x10000, 0x4, 0x0, 0x5, 0x1, @perf_config_ext={0xadf, 0x2}, 0x80, 0x0, 0x0, 0xf, 0x6, 0x4, 0x8}, r2, 0xb, 0xffffffffffffffff, 0x1) 20:12:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000800,default_permissions,\x00']) pread64(r3, &(0x7f0000000080)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) [ 275.342496] (unnamed net_device) (uninitialized): option lp_interval: invalid value (18446744073709551615) [ 275.360564] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 275.406792] (unnamed net_device) (uninitialized): option lp_interval: invalid value (18446744073709551615) [ 275.418332] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 20:12:13 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f0000000340)=""/167, 0xa7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x480240, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 20:12:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x1000000000000000, 0x3}, 0x10) 20:12:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:13 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4482) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fcntl$setsig(r1, 0xa, 0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="930279d470e22adf9bd6f9201da422e0a214c863e2d6a3337e6ef4d15151f3561f088c0a4971fd8cc87ed96360383f3e07fc237b74826c9ef189a42ddc28c64cff1981aae2537dc3d46bb8d4793826733fcc", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000800)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0xffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="16e1cf0ad1cc3b18f06fa62887d0da1bbe3bb686df2b5a95a3a8f35211f5677dacc724712d2349718f21d6120070b94f9df7103a1a1093e79aeb404e2f22b808d7bbab50883177c57108146931cc632af9e4f8be1ea99ab06318fbcfd281c263061f551ce435", 0x66, 0x80000000}, {&(0x7f0000000480)="7241edba6843e35280c5d38699bf600edb0b2c0a81ce769576b5ecc691029ff1634bf4f8ef95807ba9b7014c302f5413c1b3e6f8fa1a6c18503da25cc0822e4e2a408b4143e36fda84671173a647c5f8f01d2288f602e8914d98dd7827a6ecf2e167bb4d46bc7c290746c351970b581e53", 0x71, 0x40}], 0x20000, &(0x7f0000000700)={[{@nouser_xattr='nouser_xattr'}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure='measure'}, {@uid_gt={'uid>', r2}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@subj_role={'subj_role', 0x3d, '/dev/fuse\x00'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsfloor={'smackfsfloor'}}, {@obj_user={'obj_user', 0x3d, '!'}}, {@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'fuse\x00'}}]}) 20:12:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x280300, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x102) 20:12:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xdaffffff00000000, 0x3}, 0x10) 20:12:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30103030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000000c0)={0x3, 0x401, 0x4, {0x77359400}, 0x5, 0xcfe}) 20:12:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffff5, 0x4}, 0x10) 20:12:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xf5ffffff00000000, 0x3}, 0x10) 20:12:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x322, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0xf) 20:12:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d731d85a0d6d714cdc73448c664c566e689221bf97dde575445a485e8d9a083bb91634fdcdd7e2f214526b0195aedd5d7398425d45efa4d1d04a7472bd28870733015ba2f71d58ae7b4807b8513c446f334cc4a28b232a52fc9e44a05b694da25d575454e52145bdb110f11cf7beaad73c1e904cdc4bbe03b8aef42f1a9618128818abb76cc8dde5fd7331507322024522cecdd3bf486607b1a2bdb5dfa84797a77a58bde673c33b71640a586d52c133ffc968f0325e95b72496a3e9f13080fbdb392f986fba0b3b8348a0858cd1a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f0000000340)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) socket$nl_crypto(0x10, 0x3, 0x15) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:15 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x88100, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x4000, 0x6, 0x9, 0x1}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0xfdef) 20:12:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) [ 276.937695] audit: type=1400 audit(1552075935.202:61): avc: denied { create } for pid=10595 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 20:12:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0xfffffea7, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000240)={0xc5, 0xf, 0x0, "23f641fe3e9a53a8923fdac28631e7176bcef6109bbb31c78b56af318f4fc31a", 0x7f77777b}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r2 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8000000008b0f, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags=0x1000}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x6000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 20:12:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x20000190) 20:12:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x20000) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000240)) read(r0, &(0x7f00000000c0)=""/167, 0xa7) write$binfmt_misc(r1, &(0x7f0000000340)={'syz0', "89e8d9001fdb7e125382483bf69880be6cde576897ceb7d64590c14c32e425c092ad2efb661adf92f586710184850d09a93c9b6d156d323e49cff0fe9db2f3720f1430d28f1a45f7a90ab8e61085f57b9f1b6cdc813fc22db19e6cc7b2ff9da8b38b5871ef711b825c135fd263689ffa2550bdba3107d2d5b44d60"}, 0x7f) 20:12:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x559, 0x3066306a, 0x3}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0xfffffdef) 20:12:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=""/11, 0xb) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfffffffffffffd4b, 0xfffffff5, 0x3}, 0x10) 20:12:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0xfffffffffffffdef) 20:12:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='80']) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x6}}, 0x18) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20001, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000000c0)={0x4000000000000, 0x9, 0x100000001, 0x40, 0x1, 0x80000001}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x200000) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000480)={0x1, 0x0, 0x2080, {0x1000, 0x1}, [], "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", "46bd889f3aeef643bbff2b01746ba359ce418760d96102ff4845c66d353707e9436f7c6d57dabec6c769e5ff2308f78909b130b972e37571c023d1be9c4091290b6be9e69d8c936a97907dc8bd8e085089f06973f7373dc4f3aba8d66d113281df464ab5d32ce32628b59fcefbcfd6a6e9e189505476e4e3e3e32dd784b45738c5551256a7ea8720bc3e5c59383c305bf47c05bb601930c3e662d31416b32eb15eafb25da6074e44914f29dea83209e99f7a5243900064ad6eec8897d02e8c7294cffd231d1d0d9586f3bc6d7662ead4f4b8222b896abc5695daaac2d3c65b9ff71d91c72a58d1157babd9b44296b60528285a689841c429fc3b070456a62b8e57e690df5f3f539320304f3574faae44ef14c0a2dd224e4ba3188f402177611ec39338dfa443eec56665ee0978fa0aebb764df7c5ea3686f696e722643a05d2ad164c8b6b336f2a63863ed29bf6ca3e47664600459b631ff196bd7822cc07fcac5b91cbf0ed44e36ba20d29e46c3061204db6ef604a332ffaaa03eeb28ec65007983af4c688f50b4c5d1bf259a6952e3d3996537288917d99fc4eebc9e3e602b1207cfb08f99ab1f066a6b0a8c0179d5f63616281e5b7909690dd91463ce47614ef30b99e82bbbc8d8e619cf6119fdad4ae3164decda2a6557b2facf1fbebed5f76dd471070f07042d9be40d62bd0fb7e9cea47ba611162853c36bce4828fcd27187f2fd4c04a876559b43f0df9e3075cb45772cefb2a2fb5b52d5679a25a11d58f4a500bbcdeac62a8283a94171122eb66979226045d379f2efe0fa685cab6aa6eb777bc78a91f10cf1890eb6645c3d8e7b16318f5de2f7aadbd2ea05c88fe9a2ff039bf250f9edff456d4beed01a4e0b4d1af62110d3977b818e07d64dad49818148c6d1c369f968909f62f320766eb1aa3d2230dd0110d897905b662c925d4ebc8003c4bbf3ae691d8cab4aa68fe91c7c7bc7e8cc5e9fcbae41d81cbf83581c41ecea540282a1be09dbd4e43a753143d8435f10cd0f9eac05bd9e83b951c2025d3abe3873fbe6a3b30c320b5019b352fc28358b37d3ed6600affac0916e6e669c2b4a83f456a8777ca1140051119c4dc3ca82feb1b21762dd32141e6b11c544c8699449fc4729ef17bf4cc985f995d67b1f2f6b772380a0d44457709d11094c4830a37b315b4f24cca423911f61d39200530fbc8bb48e2c13f5dfb4e1f2b3231f5a7670e3f00328f91146e5b40d7efe63a1e1bd409b9d058f858fc34feedee1432cbe390fd639fc698b0601e03865ad61fda76a3932d267dab6e303504b47d37a61f05823843a73c5c050c7091009c2afc0dab9f6ba0d1a409fb96cc97155a3383c899b370319c09e4d879c22d187348a37f08d86012d42fdf504c1493aefb5f225acef6081d5706b2b5807d69d245c689462474f4c9bab916faa716c7c2cbb22adb8ce3757d957d20b3cfc3a6665a57dc44aa6fcfec0b5519104e347b3608f585db3aeb9798afd7cac942d1c195ca95b15556f74629edce9e6df0a885af002abed273e727c501b85e2a7148054fbd8f0c3d6b5915aaf128f9aec4b8ef1d35b84fda014650109297004d47ee556bef99b4c492813df4b55fe60ac6c86d26673a4645cafa807c61f8938c701d67ea4475a658c040d89c829dd64f362ad4bdf5025dcc531fb2a3ec4f1e96c47608edac2e9acf04d3b1b2e1546b0c61956f3b308c64ab32bb3e3ba53878c8e8a87177ca2be2f5e9a6ecf7e9a4ea524d54a6c53097d5009b3f77f69bde260e82538b7ec9af2145689f071596c00c692849934ece0dd6b581e3bfeb6b8383dba51005698a936e995842dd6238898ab28fc809382a79167194c299ebcc99126753f5879f638d3b76d81bd572690bb1a304e7fde1bb9e3194dc96a5b0552e81bf230243baded2be0785f1160e251cb80a33883efbb98043b47cb0b3ad12bb3a49a3e5d2a3e962607fb51c67c64e75b84234090aa9b86622f9646703cce62144a2a31651ca9e293d3cfd4d328a89b63e1a96512e0caec77fde0be605cad95ce01f613c481dde0a4359950e6895752b9d19e4d3a13b1f91c601cd43e3e4428278d967a26d5f116aaa808f4c750e949d91650dd7865f8c0ce7d686d70a8cbe82555a7050eaf19b40724ba42e6cae74473c5643970808b66fbe26d790d2ae51f2d518e9b95a3f69ba1b8254fd84918f658f2a983c355fad1e5c084cc884696c1d520474bcd08c70ddf82f49f4d56e1babf96e8be79482ee85d7fa6cd0293c891bc142107eba33a834d46619d16060697c2938d5fac51f7cf9ae3afafb7ebb7b55d077ddd9fe894385d4ee244c9cbef22bdb887e2f1bdb996f3dab5b5cb507ae094f0b13f59ec53f79cb89f0aa80f18b849f454b28b561f54cfba11425023432d7d0bf629b90eb8bbb04eb272180f6e3d2fbb4d840598dc62de4549fe52efb2c7568e5083a4f80d4d4566882fb389934289d3f91d4d8d49957b0757b0fb8d707382a117265b1dad53265b8275f639d2a94d19b85450eeff3e91cc56b66c258ed82ddf0cc4c74b427412eb30a8953c402cd0f36ae48e48abbce654e3d832939ca083e67c309b40f7b800435af39b06e0e567faf591b72111455ee836ec1fb714c31ba7bb207665e220fdb308973f5c00c8584e98bb3bd78417eea6649d9bccbe3ed47ce58db544fa2db83068dc86da7350608603fd71228f259f769a0be28695814932f7e05be7f58c4e615b730df1e036fac53e301d75a53711e9810a65ae6100d43c2479ee38434b35471a23a233750eae2043791874a7bcf6f71abeacea3b21e1caf9aaae442e036ada960f7ab7d70e4c7acfe02e407e707cdbadf86b82eca88db3045f3af66fdc684bdb2ad9a328d3542b062a06260a24510619e2d2a4cea0aa432d7dd52ecea4742a1c3c3fc47748a9cc2d46d879445fd52fc06ee7d96567b9666d91ba805f5664ef48aa291cdc76b7d3c3f4969400c63569b1cb9b67ef063a0eff0440d1d51869192a1cb706fc87887fe12ca001ccdd026a2d16c2247c2d19e6e92e5e327325cf13f53de6b4c316307e00a8e3af16e0ed3dfcf0221d9c4970a8d1d105392f6ea89416e862c441541831f0702889d0530bf52f5e07d5839c4a1ccc29d458f8f37e738697106b462494619bd0cae508de2ee5f7d10e5ae8d3162cfee361acad040bd93be48a9c0df8da68adeb6868db22dd208f6260f5976bfefeb928cd82381a281ce65508843a369ce26590b6594a3f977a8d2b4e1cd1a6df4a55c039bfe1bb73047932f240e1fe5cf8c83215b290ace9bd286e2cf28cced6f94fd13ee5c68ac65d5e73f87a1cee3bb384ba1e0315da5dbca04438998f5e17cffa1f1243e72621b7dfa8046e113c1ff3634ff2401067e4bfcf964245de2a669543a878e376dfc93313c25303504c2084cb78760aee5a7ab3ec28d0835546fcadaf9ce8da681623483098f703020343663a89f2177e8d56de80359f76875dfcd35167d60aaace06148d6ebb079ddbebe2d707015870e79ae2102264ceaa1ba179ee5115c413c00e97c17eac81ab48591a2a7005f1d24c7ba5e51e6a1f1d562bd14909d35df5298339939c54402b92303c2fd79e73b94904a9264b0469850e72c15b53c9f9a48087b29e305ec32b80c723c36e35e07bd8b28dc2251d2e62c3c956a2767644b5fb8780cca3250301d848a5da7e12bd5543667356caf6e422a9a14013beb18ee07e2539e679e7606de48a1efa01461c68382d3b9ab14dd30fbc804c70397dc0e5849100fc0e5bb98d88f694db1c22bc424b0e89a2fa9cb86a0ab38e1585f9d661534ac35d1544acf90d1ac0a14530e8a19d80d513cc00e6093d12426a7b5ac82fe7a680fb373c9bfe10dcdd00f268a2e8ad38342b4f923734b7c1d4103639747e40fa901ff6d727e4db99a121d1012ba401fe0b87e49b48cb1cf12bec30a934607ae0918d48e2ac7435871c427192a4b1001fb2979b72d7dd75affc66032f966737bc8b4136b74a8d196f0e922539d1d8d3657e83ac8b479741acc606251be2e486b1ee724cc12a273c2b76410adf5166931b17e32c98bd6fffd601cea7004ad77e5f4cc95e4f301bbf8b07d0c917fbcd78f9b3643495b9074c2edfde33c027d7db3ca66e8df22ed26bb4487f85eb0e6dce41ba6f2801e788648245661a01e94709a96dfd9a75b8a6a6bd374933890eb1be0fea0796afd40b11dd15e0b488180fc255607e183a1123293176925cbb6b2f13a776173d7d1bc564a5208678d5df82b1e04cf67e52e383543b8c4d874128cff8f3e7b9f07a2c6de188483e0aac6942c8492ea37ee89e4c0e822bb4df4727c2b65961c72dbe6a097009d983197c3d72b815ac2153a210b2c8588704675c9f7d011acdada50462652f935e5fa7ea4c92e66a27fd2f2e3690f15cd6360b17ed2f5f2c970cdd6cdf81520e747f1468d47beaccafb4376dc4509f3c05d96c1bb994dc288697cec8d43f8e80e65a9ac3bc7c542a97e3c3f8c139ce6ff24e14143cff8a69ffcb8bbc54f19bc157bef5caa109f44f0e5e952c02bfd0095dc478d7572dad7c0038f37f986148e6d1f5fac26a8dd7f8f663eff61cb8962fd71626d0f0503cfdef11cbeb4acea376a1af0f1da1efc114a48473f60ba4bcf9813ca935182a913b82469237bded36e35112465da27c19bc51fcfe9d733988a22a8d6ef24d07c39e5cfba465f2dc5e51eda60fa7760f6937549903c9bc7ae64e0acbecbb65eaaaec40fbb38ad7c7749d69bd3edcdae078923ac484cce93effd0b43061d28f4d90f1f10c9878f952811c4807df4077680ff1badfef89e015086e50e612b819d59a9d644a260f4b39ff9ca309080382f1506769bc4f1856edae9c120c946c9b90e1d3ae446e0b8f03e594751869f6f9c3b178db4b8db6e3911d1103619e473035250c323bf6539b0296d2d804c4c3afd68dfa455e87249a57ed4fb79a0df68fe2878a5d2af9a8fe69e7750e0bd74ea8cc8de26b7d04fabdb582ebf5279b1e8a70317b84cd865a7e6f26025f9b3e927d21d4fe391cbc4bdd63ab6d2c859b550f618c03c4e7acd2a885169d82de168702105c231c7436b6881b0dd4e34a627ad78ab7df4f91161f8f211f07d483a0cb3e16caf7e2bf4e970e2c0300ebf0ff67abd3d3604b2a3eb13acbc7470ebfddca155897bf9570f436c408d5acd0274e07022ec170b8e79e5993511ee2f269624f2bd2eb46beb7ed36c2149186a10a65a880830b1e140fc1b17e85810dfcbaf7e0fe82fa09d0de73a59b805fbcca812f562559ef4885b8b76c37369f929017ca72c21b01d4c06aa9bba33b3e9bab441f7e578bfe139214275b6328d8d3aa515eca72e40d1e6e2123bae1ccd8dac3221f134d32358cadf73958ec5877d9aaebf13c287fbf3fd919f9881a4f7983c6d77396c02b9dd4372c9b54ac264a7d63264706e3e65a8267b3dec88b3eb4eeb4a9af06d73e0e4c35e86080842b92af84f3670369989f5b64c38822c34b1aa0447db9b8f6cf524c3e75f60b85450f5412324ea2e3c58f245d4ac7b2eac36df1d57db22bd1d8f6f4ba3ad6e613235ac353dfcfc5176c661509bcb15bd37a9f29adde25c839d6be2b427242c4fe36b2fb44dfe74089f91646e299dcaaef7e56363e5d8d862e8e73ec1568566df81d9da8c3aac1a7bf354aaa277442988240a5f078a3d0e4475cb8661fe67af4f4a3d8e2a4b447a170a8f368d0e12c7d4911c5ebe03ebdfa5a53b7bb63dd2cb3bec7614ef22d1919d6feab11d73bad1dea096a7a3b483322724d"}) 20:12:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x2000, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x4000, 0x0) execveat(r1, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000540)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='fuse\x00', &(0x7f0000000240)='-em0wlan0ppp0$\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000340)='/dev/fuse\x00', &(0x7f0000000380)='!\x00', &(0x7f00000003c0)='fd', &(0x7f0000000480)='rootmode', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='fd'], &(0x7f00000006c0)=[&(0x7f00000005c0)='group_id', &(0x7f0000000600)='rootmode', &(0x7f0000000640)='\x00', &(0x7f0000000680)='proc.\x00'], 0x400) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c57d3653c612f64e21e28ea1d077de94d7a3c831036dacace8b69fac0d46f30b33bd9ae885d046fc9530b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x3}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:17 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000240)=0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000340)}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x80000000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xfffffffffffffffc, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000240)={r2, 0x8}) lsetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.nlink\x00', &(0x7f0000000380)='group_id', 0x8, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000100)=0xc) 20:12:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000080)=0x1a3) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x220040, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x4c) 20:12:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:18 executing program 1: syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffffa, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x8200, 0x4) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x80000100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 20:12:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c9193ab03ca1fc2a5d700"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000340)={0x400, 0x7}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') 20:12:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000480)=""/76) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f3d30303030303030303430303030303030303034303030e224757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x54) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x100000001, 0x44000) r3 = getpid() getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r2, r0}) fcntl$setownex(r1, 0xf, &(0x7f0000000500)={0x1, r3}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10040200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x7c, r4, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0xffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0x10001, 0x202000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000500)='nbd\x00'}, 0x30) r3 = syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x3fb, 0x163, 0x3f, 0x5, 0x0, 0x8, 0x100, 0x4, 0x19ba, 0x1ff, 0x3, 0x0, 0x200, 0x15, 0x3, 0x7, 0x81, 0x3ff, 0x8, 0x6, 0xb9, 0x2, 0xc70, 0x3, 0x91, 0x100000001, 0x9, 0x8, 0x1, 0x8000, 0x0, 0x7, 0xa300, 0x6a41, 0x6, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x7f, 0x7}, 0x83b6337da668b8e0, 0x6, 0x92c, 0x7, 0x7a4, 0x3, 0x8}, r2, 0xb, r3, 0x9) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="140800000000fbdbdf25020000000c00030014000000000c00050001000000000000000c000200ffffff7f210000000c00040016000000000000000c0005000100000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x20040800) 20:12:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4a67726f75705f16093d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030e7302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x40032, r0, 0x0) r1 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000480)="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", 0xfb, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000100)={r1, 0x1, 0x6}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'ghash-ce\x00'}}, &(0x7f0000000580)="227b42beb75c0ca83be1e73479803d63c6fdab73cdb2f90dc05412f3edc46739acd1dc05e8b4bda5f889ca9064cc808d232f8a92212fbe995770f19382a4fe7ee213a249148a7cb8e125881b194e1c655aa74b223b0ce78daad8", &(0x7f0000000600)=""/222) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0x3, 0x4) 20:12:19 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x801, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='pids.events\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="5938e77b7e1b8f31efbb446a5a9875593be663515d02582dac252dcd02c88fe0f1be6fdc529e59a9fe8618d5838b63bf8f26723aab45e705f8", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000000c0)=""/116) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303430303030cb0f2208fad8a4a13d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = dup(r1) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x4) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000140)={0x2, 0x5, 0x9, 0x7f, 0x7f6776bb, 0x2, 0x8}) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000480)={0xb, @raw_data="83d74fba53c3f46da05ec68c178cb1d4963a09c441c5e0bb3a6173415a0f580bc8c1a9c869d5b14adfe442f9c3af34022485344b1f2faea9f6a8f973553c57c38d0e6e84b52250866957c1e18de5640ac51d39fc49c10efd52688c7b53de4857ec98fd893d85edff7819b86d76d29045f80afb9f52265261cfbad93849f5df23f093c07def7ca28f7f23a4652d1914827d8e574244c215c5e791c7e6603d599c9c85e4f7c4d4f42dc98e9e523baba98601e9436697b921afe8684548e12b71eae4428f05c5836f08"}) setsockopt$inet6_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000580)="08ab15ed2497d15967365f84b576a6e04a518e4f559fd563670b0c03c9d074f357fbb54da711bcc1f4c7b11f6398d9738928471a57909fe2b60e6979a6705b3ef2d8dd30f6273e3fe93703ae77c48a9f8b97e9f8fea81fd111665b95c49b6108de8e82af815c2bdcde1fbf607cce6bea70c760250d7d4ffe572d8f2cab8b3c29daf127a10f8a51605f80368065374a88d69ff55ab3eb16b1f0294719458fddfa778af5f05b286a52289f5becc79f53093fe211349cfc445a4474151d3ad6f38005fd9e1594ad3070a747fda92c6f5e5ceb02ccc38fb79ff4b3911df2a2", 0xdd) 20:12:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$LOOP_CLR_FD(r2, 0x4c01) syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x20001) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000240)=0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x7, {0x8001}}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030403030303030303030303430303080f2dcf2497930302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x80, 0x400000) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000002c0)=0x1, 0x4) 20:12:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x1}, {0x3ff, 0x95ff}], r1}, 0x18, 0x2) 20:12:19 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x100, 0x0) syz_open_dev$cec(&(0x7f0000000680)='/dev/cec#\x00', 0x2, 0x2) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) mkdirat(r0, &(0x7f0000000640)='./file0\x00', 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r3, 0xc0585605, &(0x7f0000000340)={0x0, 0x0, {0xaa, 0x6, 0x301e, 0x1, 0xf, 0x3, 0x1, 0x7}}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB="1da69c44682c5f541252", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,default_permissions,default_permissions,default_permissions,max_read=0x0000000000000003,default_permissions,default_permissions,uid>', @ANYRESDEC=r2, @ANYBLOB="65723e0000000000000000000000000005d6b60bbf4a3b2ff95998ea9922f78dc0c9a90a373cd47987e75b822776e824f93492f3d3380e9fd3a84627987cf23dd19c839d95d1fd761e20e482309f15b1c11cab5a6db29f675d421c9e33c8ec6bb23aefbef57948d53d1499f99f7c900bb948af3f955889559fc41bc0023474", @ANYRESDEC=r2, @ANYBLOB=',smackfstransmute=fd,uid<', @ANYRESDEC=r2, @ANYBLOB=',fsname=:/#,\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0xeb, 0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0xd0, r3, 0x404, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) setfsgid(r1) 20:12:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x7ba, 0x200000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x70, r2, 0x204, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3a60}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x6996}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4855d057}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4) 20:12:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66e407", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$TIOCEXCL(r1, 0x540c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030d3303034303030302c757365725f6964", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643da19dc0415012cea23dd36d434b89d9cd8d342f5286db5acb80455416329a9506000000bd311594db56591d228010a94d7c6c44c669abb7084c9fffb1f9342f42054885ca19dc2bb1eb3c07b9b289bdcf0ebb2b6db362adfa0df181db2a6c81897b1c0dc7ef201cea7d5b93cc6f337124c8d2e71f7824c5b2d977034181bdeec4ed1fac56ee26454e4ff2", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xfa, 0x404400) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x5, 0x101000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x20000, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000000c0)={0xa, 0x1, 0x4, 0x7f, 'syz0\x00', 0x5}) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:20 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x38041, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000000c0)={0x20000, 0x0, [0xffffffff00000001, 0x2bf0, 0x6c780, 0x4, 0x100000000, 0x81, 0xc6, 0x1]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000140), &(0x7f0000000240)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x14) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) [ 282.316412] QAT: Invalid ioctl [ 282.345257] QAT: Invalid ioctl 20:12:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TCXONC(r1, 0x540a, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000000000000c003", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x40000, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x10001, 0x220480) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x2}, 0x7) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fN9', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={r2, @dev={0xac, 0x14, 0x14, 0x1d}, @broadcast}, 0xc) 20:12:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$caif_stream(0x25, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='veth0_to_hsr\x00'}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) prctl$PR_GET_FP_MODE(0x2e) 20:12:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x2, 0x1, 0x47b7, 0x5, 0x6, 0x1ff, {0x5, 0x8, 0x7, 0x90f800000000000, 0x7fe, 0x7, 0x0, 0x8, 0x3, 0x7, 0x4, r1, r2, 0x9, 0x20}}}, 0x90) 20:12:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000240)=0x80, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x3, 0x30}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @broadcast}}, 0x4d, 0x6}, 0x90) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vsock\x00', 0x640000, 0x0) mkdirat(r4, &(0x7f0000000600)='./file0\x00', 0x108) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xefffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="1767726f75705f69643df79e670a3b8af4b7fa931e942601c7df2e86b8f1c9b2981ae06778bb3889b241e728ab", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = getuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x1003000, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x81}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffa}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8001}}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, '^,('}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@pcr={'pcr', 0x3d, 0x37}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x10, 0x0, 0x3}, 0x10) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8000, 0x0) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f00000000c0)) 20:12:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00fb12f04e85032504705652e97207f1d8759fe68e2e665eae9e970a58ed0eceeda22f54297da76fc8da062fd2cbed09492d0cdf682fed176879a1e8ec66ca04467113a18901b4f819ff09ca79555c875d4359b9dc0260bfeb2be62fcea708c70b"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000340)={r2, 0x20933476b1277c28, r1}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=@delqdisc={0x5a4, 0x25, 0x11, 0x70bd28, 0x25dfdbfe, {0x0, r3, {0xffff, 0x4}, {0x1d, 0xfff3}, {0x1, 0xffe0}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x1000}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}, @qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x428, 0x2, [@TCA_TBF_RATE64={0xc, 0x4, 0xffbbfa32777d1a83}, @TCA_TBF_BURST={0x8, 0x6, 0x200}, @TCA_TBF_RATE64={0xc, 0x4, 0xa2be59961edd1fb1}, @TCA_TBF_RTAB={0x404, 0x2, [0x100, 0xf6, 0x81, 0x54ae, 0x1, 0x8ea, 0xffffffff, 0xff, 0x0, 0x8, 0x785, 0xfb, 0x133, 0x1000, 0xfffffffffffffffb, 0xffff, 0x1ff, 0x2, 0x6, 0x0, 0x20, 0x6, 0x1, 0x1d2, 0x200000000000, 0x46, 0x1, 0x5, 0x0, 0x8, 0x6, 0x156, 0x9, 0x64, 0xff, 0x96, 0x4, 0x5, 0x7fff, 0x2, 0x3, 0x1, 0x1, 0x4, 0x71a, 0x3, 0xffffffffffffff01, 0x5d, 0x1ff, 0x200, 0x100000000, 0xfffffffffffffffe, 0x4, 0x0, 0x8, 0x0, 0x7, 0xb3, 0x3, 0xfffffffffffffff8, 0x6, 0x7, 0x3, 0x9, 0x5, 0x913, 0x20, 0x5, 0xfffffffffffffff8, 0x7fff, 0x9, 0x1, 0x0, 0x3f, 0x1, 0x80000000, 0x3, 0xe2e, 0x2, 0xfffffffffffffffb, 0x5, 0xffffffffffffffe6, 0x9, 0x8ae9, 0x0, 0x0, 0x100, 0x6, 0xfffffffffffffffe, 0xe218, 0x1ff, 0x1, 0x1, 0x5, 0xfffffffffffffff7, 0x8, 0xbe3, 0x8, 0x1d60, 0x8, 0x800, 0x6, 0x4, 0x3, 0x10001, 0x400, 0x0, 0x3f, 0x9, 0x0, 0x8, 0x7, 0x401, 0x6, 0x0, 0x20, 0x5, 0x5, 0xfffffffffffffffb, 0x8, 0x1, 0x9, 0x1, 0xbb, 0x4, 0x2, 0x3, 0x6, 0x9, 0x0, 0x3, 0xfff00, 0x0, 0x87, 0x0, 0x7ff, 0x8000, 0x8001, 0x100, 0x81, 0x7fffffff, 0x5, 0x3, 0xfffffffffffffffa, 0xffffffffffff4139, 0x1ff, 0x7fffffff, 0x2, 0x4, 0x7, 0x0, 0x6, 0x2, 0x6, 0x8, 0x61, 0x4, 0x9f8b, 0xfffffffffffffff7, 0x4, 0xff, 0x1, 0x6, 0x3ff, 0x4, 0x95, 0x9, 0xacd4, 0x58, 0x5, 0x5, 0x1000, 0x80000000, 0xffffffffffffeb67, 0x9, 0x1, 0x7, 0x800, 0x5, 0x8, 0xb14, 0x0, 0x4, 0xffffffffffffffc1, 0x3, 0x6, 0x20, 0x1, 0x9, 0x8000, 0x8, 0x6, 0x8, 0x9d, 0x771ce6e8, 0x5d, 0x6, 0x8, 0xe6, 0x80000001, 0x8, 0xffffffffffffffff, 0x9504, 0xffffffff, 0x3, 0x1, 0x9, 0x5, 0x4, 0xebd, 0x1, 0xffffffffffffffce, 0x7, 0x3f, 0x3, 0x400, 0x9, 0xff, 0x5, 0x6, 0x9f6, 0x3af, 0x7fff0000, 0xff, 0x18000, 0x6b, 0xb5, 0x4, 0x3, 0x6, 0x81, 0x10001, 0x3, 0x2, 0x2, 0x7f, 0x400, 0x9, 0xfffffffffffff000, 0x1, 0x5, 0x100000001, 0x100, 0xffffffffffff8001, 0x9, 0xffffffff, 0x3a9d, 0x80000000, 0x1, 0x0, 0xffff, 0x44e, 0x8, 0x1, 0x6d4, 0x802000000000]}]}}, @TCA_STAB={0xa8, 0x8, [@TCA_STAB_DATA={0x10, 0x2, [0x0, 0x5, 0x100000001, 0x4, 0x1]}, @TCA_STAB_BASE={0x1c, 0x1, {0xfffffffffffffffc, 0x10000, 0x3, 0x4, 0x2, 0xfffffffffffffff8, 0x8, 0x5}}, @TCA_STAB_BASE={0x1c, 0x1, {0x3ff, 0x6, 0x187ebc10, 0x6, 0x3, 0x79, 0x401, 0xa}}, @TCA_STAB_BASE={0x1c, 0x1, {0x401, 0x8, 0x80000000, 0x40000000, 0x2, 0x200, 0xfc000, 0x4}}, @TCA_STAB_DATA={0x8, 0x2, [0x6]}, @TCA_STAB_BASE={0x1c, 0x1, {0x7, 0x400, 0x2, 0x7fffffff, 0x2, 0x893a, 0x9, 0xa}}, @TCA_STAB_BASE={0x1c, 0x1, {0x575371f9, 0x1ff, 0x0, 0x48c8, 0x3, 0x3, 0x80000001, 0xa}}]}, @TCA_STAB={0x90, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x3, 0x800, 0x39, 0x800, 0x2, 0x6, 0x80, 0x8}}, @TCA_STAB_DATA={0xc, 0x2, [0x74, 0x80, 0x0]}, @TCA_STAB_BASE={0x1c, 0x1, {0x6, 0x0, 0x9f, 0x1b, 0x3, 0xb42, 0x0, 0x8}}, @TCA_STAB_DATA={0x14, 0x2, [0xffffffffffffff00, 0x800, 0x9, 0x200, 0x9, 0x6, 0x7ff]}, @TCA_STAB_BASE={0x1c, 0x1, {0x80, 0x3, 0x8, 0x6, 0x0, 0x4, 0xff, 0x5}}, @TCA_STAB_DATA={0x18, 0x2, [0x200, 0x0, 0x5, 0x6, 0x1c01f255, 0x1, 0x101, 0x2, 0x2, 0x5]}]}]}, 0x5a4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0xb, 0x4, 0x2) getpeername$netrom(r1, &(0x7f0000000340)={{0x3, @netrom}, [@bcast, @default, @remote, @null, @bcast, @netrom, @default, @rose]}, &(0x7f0000000080)=0x48) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000400)=0x1c0000000000, &(0x7f0000000440)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xab6, 0x4000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x401, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) accept4$tipc(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x800) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="5e7a8a12734d03b4281b2d7e573f918625239603ad1243b19dffe3"]) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x20, &(0x7f0000000540)=ANY=[@ANYBLOB="6d6f64653d30303030f2040e303030303030303030303030303030303031302c6d6f64653d303030303030303030303030b0303030303030333737372c646f6e745f686173682c7375626a5f757365723d66757365002c61707072616973652c66736d616769633d3078303030303030303030303030303030322c00ac850de3e2b48b471cb7b637430c8c6ee8267e7cb6795f1c71c34a425b06f58f76154e3bafad47d616adb7ea6b396a7f9f534c17408045ddc2a0a3f39a54584d0524b8c3598ce952e4ccdb2ca37fa895db0814f3420ea4a3fa94ae6c0817165bd22ee2f819e6100b6bdcb745da126ccbd6855343713f532cab978448a9122cd816d61bd55f781673309ed5baff38fd9db24368a5d8d07303b0bc170b1e99a2988d4e027cfa0ca8d0791d4f1135812b0a0e00cc378a4c6c797ad250c4"]) syz_open_dev$sndtimer(&(0x7f0000000480)='/dev/snd/timer\x00', 0x0, 0x4000) 20:12:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0xfffffffffffffe9d, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x3c, 0x1, @thr={&(0x7f0000000080)="fd9b96bd10fc8b54585b2cc8e536d3ee11604b43eb3e42c1c5a97e8ac9ba2a4696f9e4dde80ad73763c3a1b4cfd43280073fd9d16ca446abf7553f60c5e8cca1afb5eb0e20c8854910135099a40d4a5ec60098e25f6e74ad250f390118ed8c71dad8c44f15252a72a9f5dd1ae88ff3f05413c8bd22877d37da68f0c609557c7845ae4caae3be4ac312c6ee6ef57244cdc2532108539dd731144929b6db02cbca8408cf65904af2c347d5a5dac5321692a2eb9d1d6a348fd87035a5e3c3b76a21994f78ba91a8bcb8fd8afbbc68d11e9e94803dabaff729d6672fd092d41a33a504378be33c7fd057cd6e6fd88facd087f25196", &(0x7f0000000240)="45197442836706684658d30b8921b68430f4752b"}}, &(0x7f0000000340)) 20:12:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="3be5e20cd0f3bf8ddce382f92361ac9853ccdfcc31baae0eddaed0e0391b0010adf1a79ac5bd6d800def09c273e7c93c82f96f788d5f66ef25b0e43215fe9e8f556d8feefbc5f8e2adcd08f55078795e1cd47b2ced22a8d45fdd0a3d780b0742aa0bf8e69b61fb6aa18e6cdf3cbf", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) tee(r0, r0, 0x80000001, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8102, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4081440}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0xa0, r2, 0x410, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x54f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}]}, 0xa0}, 0x1, 0x0, 0x0, 0xc080}, 0x8001) pread64(r0, &(0x7f00000001c0)=""/84, 0x32, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f00000000c0)) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0x78d) 20:12:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fstatfs(r0, &(0x7f0000000080)=""/24) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="69fa313975705f37d728", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a11857680f776772b66f586282c607a3fa38163b306ca8fd8d9f2e5e08ee93304b8fda7de43e064e7e78c155161ec1648cf144"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) 20:12:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fF=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000240)) syz_open_pts(r1, 0x2000) fsync(r1) 20:12:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x100) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x1022000000000, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x107) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x4, 0x5, 0x1, 0x9, 0x7, 0x800}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0xffffffffffffffff, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000080)=""/65) 20:12:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000c40)='/dev/admmidi#\x00', 0x6, 0x10000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000c80)=0x4, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r2) munlockall() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00eb900416656147415924a4f69f37e0738c215c8d9df32d2b5dabf6b17205412d291119f02b50f0cc74ceaf8a8bad725473754543c2fa7b3c7c5f8bc85b419e3c4fd5d8fc700340b4c6d4bf92f43eff071455a85620d3b3e1f2a09e712aa55d70b70363955a75081e7ba28786cb8ca0a6927ef253dd846f48a4646299c4156df6e9cbbd9311300ddebaa7f000a669d6279de0ec459e893371f2eb32cd1839975354a23184afa30813485873006ab176e0cc4d6ec1df36"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x0, 0x1, 0x1, 0x2, 0xffff}, 0x600, 0xb35d}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000340)=""/212) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, 0x3}, 0x10) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000180)=0x4) 20:12:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6465007c89895132ad5f9e7fac2e6de700000000000001303030303030303030303034", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x6}, 0xb) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x3, {0x0, 0x2}}, 0x20) 20:12:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f0000000100)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="02003d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000340)={0xa0, 0x0, 0x7, {{0x6, 0x3, 0x9, 0xaeba1c0, 0x80000001, 0x2, {0x5, 0x2, 0x9, 0x100000000, 0x7ff, 0x1893, 0x3, 0x9, 0x8d, 0x8, 0x6, r1, r2, 0x80000001, 0x6}}}}, 0xa0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x49345b9e5561de0b}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030a51dc0bb9a8e3884757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="0000070000400011208bc3b9000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) 20:12:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000S000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="424d75ee9c0acb9545cfa48ac5534b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7ff, 0x101000) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) getsockname$llc(r1, &(0x7f0000000140), &(0x7f0000000240)=0x10) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) connect$caif(0xffffffffffffffff, &(0x7f00000000c0)=@util={0x25, "2967ab6c190a3462ddf804f4090539ce"}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) getpid() write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:24 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x2) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)={0x3961d61c, 0x5, 0x69}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xffffffffffffffa1, 0xffffffd3, 0x3}, 0x197) 20:12:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x6, @rand_addr="e2c6a6d531f1c5f8598f3feb51a1c5a3", 0x5}}, 0x3, 0x40, 0xff, 0x3, 0x970e}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x9}, &(0x7f0000000480)=0x8) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = semget$private(0x0, 0x2, 0x8) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000080)=""/51) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="000000d901347ad51a5a61e149af045f7d019be6cc64eea4e4d7467c2ebb90a38af142", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d5aff3ddc7889b306de0ec4df68acd26d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x310}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize'}}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='}\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="40bf6aba8198c782c93d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x600000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1000}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) 20:12:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/status\x00', 0x0, 0x0) mq_getsetattr(r1, &(0x7f0000000600)={0x1, 0x1ff, 0x400, 0x4, 0x759, 0x8, 0x6, 0x8001}, &(0x7f0000000640)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000004c0)=""/246) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x2d, "7c9aea050a01d7d9f9ce095b1433f76646cb35b795185760d0845512b46eb09e07fd528b61c9bfe32c3030daa6"}, &(0x7f00000002c0)=0x35) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000340)={r3, 0x632}, &(0x7f0000000380)=0x8) pwrite64(r1, &(0x7f0000000680)="b9d1d85aaeae21b63e023799c7bc33675ca0f484d989e34c7c46cb2f5537585c16002ee070c1b8464c2ef988", 0x2c, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000700)) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r3, 0x2}, &(0x7f0000000480)=0x8) read(r0, &(0x7f00000000c0)=""/167, 0xa7) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) 20:12:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x0) 20:12:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x280, 0x18d) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000240)={0x9, "35ae547463667ce3aec3410d995b6d29b48d20ae2f7c9e41352c9b8a23a16e6b", 0x3, 0x1}) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0xa8, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="c04930389285e9d33dc8220b2d002eef8441d0c5ab3efe91006beb8dfe4e4a09e48a693e671b5b438f640edd9b0490d9d732c6591421a999fc725ea67fa91aa5b24df979d39025ce28cccc949c5a4a64551800ed523eedc64d89bd239a6405603039f3d37f8cfe5f0e"]) write$selinux_attr(r2, &(0x7f0000000080)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f00000000c0)={0x6, 0x3f}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000440)='caif0\x00') pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0xfffffffffffffd41) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') 20:12:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$capi20(r0, &(0x7f00000000c0)={0x10, 0x1, 0x87, 0x82, 0x6, 0x3}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0xffffffffffffffda, 0x8}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x101, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x141400) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x258, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x1b}, @mac=@dev={[], 0xd}, @multicast1, @rand_addr=0x3, 0xf}}}, {{@arp={@multicast1, @empty, 0x0, 0xff000000, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}, 0x8, 0x7, 0x3, 0xc00000000000, 0x5, 0xffffffffffffffff, 'veth0\x00', 'team_slave_1\x00', {}, {}, 0x0, 0x2}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@multicast2, @rand_addr=0x7fff, 0xff000000, 0xffffffff, @mac=@random="4ca9f0ef73f6", {[0x0, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x8, 0x401, 0x1f, 0x2, 0x3f, 0x8001, 'bond_slave_0\x00', 'gre0\x00', {0xff}, {0xff}, 0x0, 0x81}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 20:12:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x1, 0x4}) 20:12:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x111) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:26 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x100000000}, {0xb3c1, 0xff}], r0}, 0x18, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f50ad1c75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) ftruncate(r1, 0x1) 20:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101400, 0x0) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='group_id', &(0x7f0000000240)='\xcbmime_typebdev}\x00', &(0x7f00000002c0)='rootmode', &(0x7f0000000340)='fuse\x00', &(0x7f0000000380)='!\x00', &(0x7f00000003c0)='\\\x00', &(0x7f0000000480)='group_id', &(0x7f00000004c0)='/dev/fuse\x00', &(0x7f0000000500)='rootmode'], &(0x7f0000000640)=[&(0x7f00000005c0)='keyringppp0(\x00', &(0x7f0000000600)='\x00'], 0x800) 20:12:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x39, 0x200000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000480)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) getresuid(&(0x7f0000000bc0)=0x0, &(0x7f0000000c00), &(0x7f0000000c40)) syz_mount_image$btrfs(&(0x7f00000003c0)='btrfs\x00', &(0x7f0000000500)='./file0\x00', 0x5, 0x8, &(0x7f0000000b00)=[{&(0x7f0000000540)="d2df299bbaa91800479fd12e1c94b39c4fa496f41f6ee9c5e24bd50d4eeded7aafb05b09cb4621031f09b664839674d7be22b4019b421406f423e36b043d31dfc377d08df59afff5c782bb80cb1327c15cbdccce3b9ef0e4ab5ae6", 0x5b, 0xdf}, {&(0x7f00000005c0)="1ee32e560adc98f26011140f358d824ec21cd9101e5c8636acaa722b190756a34cfcb8316f3a580b08bef1439fd0ef139c77ec5f6c1301", 0x37, 0x5}, {&(0x7f0000000600)="de7d86c6d033b733987a5e30b7306705a24b9e4eae23b877ef14e7c24397452478bea4225fe882aa005bed5cd7960e5022c577959b2a63b2cc7bba494b211ce78b9b9b82ba4d9dfb7391d7d09468554bdabd2df0ed8412e0a39c1b32858a437d9808ac2e74881a8eb0345adf0310847120bee0a2c79e93c271a345c2622a1c8ed1bd60765fed5745e6763e41693b9d2adc14dba4a0d0b140c0f567bb303c93f28a11a290c7ee90d86f60b1cf6c87171cd3e78e247b6fb67fc907afc49b2c1ed8e410624abebd7462c23fe12fc1c94e6e42e5558cca666b3cdb8f8afecf16f99c66a872f545683757b12d74b5939044afe900", 0xf2}, {&(0x7f0000000700)="c93ff3fef5e45787f68823193e8bbdc01e32abd639c559", 0x17, 0x6}, {&(0x7f0000000740)="d4e32e736ab724db91aad34d62e46a774146f370e45fb003e366739ffc97cb37329f8c55cab5dc506a57805975312ad74740ccca0db340ac0e0b88aceb0ebdb43db43ba7c9a523c8af793aa363c37ec7687fe6f15d64451bd7fb6b69725102b967fdb8275f4ffabfac4f80ad25c8c29cb1ef49536b2c100a489f6cc608c78948f2b88eb8fd79f83cc9c1e3cee1f7d199bac3587d19f62981", 0x98, 0x10000}, {&(0x7f0000000800)="02380bb42b3f6641b78e91a724c30f87aee59b6361ebd1b4cc047f4c10a109496f102dcfaa717aa9770e2b778fea7022a15e26ffd68e39ad9e02eb87fb398c1bc3b66aa5955707143dde9bc7ea20795fc5e2dc67b55bb3b025c2947907c599729659767e937576c591e296d986436930c7433f887aecb25ee06def267302c6fd77f39de30f79b75a87b370572d07058f3ea74b470d55ad407ef4f846d49e3dd93e813bcaff25338b8c924f7d1ec6f14db8136c5ffa0d286bfb188952867bf6b67d66a834f4aa699496a08ec95ad3adbac3eb15fef55e4ae171c61648502c75692ca9939f8c49f795e33aee81556485bb84", 0xf1, 0xed4}, {&(0x7f0000000900)="bc650ab13c56de8b02a33aa719596d07ae308c7f5d265c180fc4b0b187ff98315845b785802bf4a7fe8d7d79a3722c7adf3a67e7f0c0ae51970a489c57bd52b2cb47412a31170819563b6a80c3bf4092b2758b12fb7b7585d62cac73dafbcb021637a1a0436774a77894d33397c1880d53377b275bb178893848e1e3b8aae66e6140f28044c052420f9e748818065262348fab5a782beba830735328a05a50a8c94ed14b1c587d9b4a3cf2ac343707171185605cfef7702d1103c47ef73e37c18809b79bd47b2b7d2383d59ed33e487b6dbdfdbd", 0xd4, 0x81}, {&(0x7f0000000a00)="07359d259491064c4618b5cbdb46c8a262cb3b48732874b536f7b647e03958021e8f26fd3e0aa23af72c5903712e7ebd512a52973b2d733022473bf048bf12a385c3df58b1eaf47d164dbb6709845c0008acbef91be26975ca7f5fd40e98c5180f39354269825a9f7e79accb8f47115d3a8c33aa9ce0fbee8a95221080bcbb419cf9e805a3227d15348729b11593ee2b698c7326d946294f2803d709636588009b41d51df440c5976cde4733aac28b5bc7d55dfe4bb01422a2e651189dd821261af2da5e6e1bc61d2e95913d877a68", 0xcf, 0x2}], 0x20, &(0x7f0000000c80)={[{@space_cache_v2='space_cache=v2'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@euid_eq={'euid', 0x3d, r4}}]}) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r3, 0x7}}, 0x10) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x10, 0x0, 0x1}, 0x10) 20:12:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x0) 20:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643d9be55856ef50552b47f1677c49487a3aa5b03c0e28f0310e8e9833855c4a3f753b7aa1052181c549551847b7c3727b3826468cc7b685504a41efe37f40339518ddc3e763d6f81053b1981d522ef28a165394ec5fb072fd7d64a3670b59ab06edd64de98ba4992db01b5a6c64146eeb0f03b7890c19486a7b4116b6cd74421a45d71cf8a3f0b2d21fc6594ac50141bf6e325f99fb98d20000000000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c676c31f69f9a8e97c5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x6}, 0x10) 20:12:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="751f0000002c00"]) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$unix(r1, &(0x7f0000000340), &(0x7f0000000240)=0x6e, 0x800) pread64(r0, &(0x7f00000001c0)=""/84, 0xfee6, 0xfffffffffffffffd) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000440)="97eb80f82c9e460dae097195c47fa5292a8e127676743de143500a9675377a1a120ca5c0047ce8db04da16e3dc8faefc107bdbf5cca9f4140f32e17cde99eef05e5b96f663b6116268af8fefa85f98b48e7e26f474c3435dd03e1bd4fe0c0d9aa224ee3e5e2d72337de0693c6337cf5f6a971f984ab84e51281fbfe725de074e69f37b9182bf27dd89b3511110052e725a849451c4f8cc91fd08c5825700d9124cd9", 0xa2}, {&(0x7f0000000500)="f9f627183d131cfffbfa1b8453fb63478ccb6042c53d23fa822954d6cd1565643c4ed87753465be72f468261584c365264611343623ab06acf47ee0d4ca0ceb95d90f05d2774bfad1b17d2393512aded40a0b7140b1b1c366e01ccebdbd6773c77c179811f70b2ffad3c64440556ecca458e5f95572d09c088f460674bff82ee4aa9c764933ad8eefd3b421795038b4e00b3494b3e3909fe31b998b79fcb4943b66ad960a9b10ed3aef3114f4bc07875d46ab83d13234f611d577d19009f49c626460e94e09a8af20077f174171af400f281099df2a414ceab61c680c0bfdee99385524320bb89106afe64535eec4715", 0xf0}, {&(0x7f0000000600)="6393d1476b5c785155bf9549b786c57ad2fad40b36dc8255678dc4704da4cdbceba15452718bd56c6cf4d1e81dfd5a9fbcd4d21b3df6ad30091ac51769a760fcc9582a57b6dafdcdb7a42a90b97b753e619179b142be4058bd4d37d614c1f896715e9f31c2249fad8697ba5e24e5c7db2bc3c0413b0a5a0aa73412f35cc221ef42bcb5b553cbacf61a095e8a", 0x8c}, {&(0x7f00000006c0)="70139593d22c359dc0d2a8e8e75f29c861df80dc7871e96be70d8fd5efb7a1ae4281b9b266fd31c027467a4e225d8dbbeb08dd7bc3bf15508bfdd043ec17bce219c2afa8e8cf0646810c2b7716be03078a5f9f760fc26c1a8afe19d81f70e9ce85e3b4d580a47ca771415bb58b87dda89584249c9a22ff5b5dc0e95550fd2747433bf3827aa7041007d07bb3090cfbe496b8eecfd2184376247956cb239dc0d84b9d54deb88a41eb40038b8d1ba06c4e82be7cbcf7fa4445162485ac47d69085e9b01a6a3a5de54d58514bf6ee88860c72472714d1b21cd18c315ecf27cf0be810d4857a9e", 0xe5}], 0x4}, 0x48055) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)={0xfffffffffffffff7, 0x7}) 20:12:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfff4, 0xfffffff5, 0x3}, 0xfffffffffffffeb5) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d408a93", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000080)={0x5, 0x0, [{0x388}, {0xa5f, 0x0, 0x8}, {0xb07, 0x0, 0x1}, {0xbee, 0x0, 0x9}, {0x325, 0x0, 0x6dba43ad}]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x0) 20:12:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000), 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="3567726f03005f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000280)='westwood\x00', 0x9) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0xffffff04, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r2, 0x2, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x14) 20:12:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x248040) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x24, r2, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="2b000000040000000000000080000000030000000000000003000000000000000300e13920cb32aaead01d026768379a45828dd5a5ff2477084b397afbf9954829340b88e037401990b0c39ea684c6277e3f990805e0855ccc5cd88efb590387a097f02db4a072bec7229a8294019b47d491d3a2a50ffd4cf5183462588a91e07baffff28a05998da354d5e1233e853a646bc14dccbe493d5f37da4fb2487367954bcabc658251d826bff0a5a7e5955eda349c5cb010dfadda23a5302315f96095e662b21550f92ec6"], 0x2b) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7762, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0xdc, &(0x7f0000000480)=[@in6={0xa, 0x4e21, 0x100000000, @mcast2, 0xa1}, @in6={0xa, 0x4e20, 0x100000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffff}, @in6={0xa, 0x4e20, 0x9, @local, 0x2}, @in={0x2, 0x4e22, @rand_addr=0x5}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0xffffffff}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x1f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xa}, 0x3ff}, @in={0x2, 0x4e24, @loopback}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r1, 0x6}, &(0x7f0000000380)=0x8) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7) 20:12:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030305c92611ba301ebdd3030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x3, &(0x7f0000000640)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x1, r1, &(0x7f0000000340)="509800b2615da40dd032fe09df061c38d2ded2a1aafdc54f033d50f8ed61695fa8ba94f7883453e2ce1cad68f767b741acfb0580330768038226271a57f23dda7586b2bb1df693922db68cdae802621c75bd1ef3cf8fa08321bf2fb0bec1b65b630f3ea22376094931e877a9b77864b92b8d01874b4042f4e68c74af5fb2fffe1a2d", 0x82, 0x9, 0x0, 0x0, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0xffff, r0, &(0x7f0000000480)="c78fe5578c35f89aada725a8ff3fbfcf48e83dd517f5805e02b906d64eefe0959ee922a083901a4ec185131e903781cae9d6990de7f4f2f84b0e5bb01ad0e668e14ffebcd5c9a309ba7821c50355bc85a9f0cfbf8f3d5f7ffffaa6d051381c9d746cfe01c8f342970a4bb6f19c53a2d6e27e3a140a7ceb88a330d5a5c2d4b064576679c1c152e1de92dd2cc725b4cee672bd1140d8e6267bbf693562090d19696535a5506211d9de0d56dad00fb2bff120eef5cff317cf8be1a396e44099f4306dde5e8c73ec6712aae5", 0xca, 0x20, 0x0, 0x2, r1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f00000005c0)="a16e27c7a4bc8ffd7a2a8e56119a8b6584ed16a50a58b20754b98357ee2aa0ca56fe437ed07f1ba353db53368447e2", 0x2f, 0x4, 0x0, 0x2, r1}]) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000580)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x1}, 0x2, {0x2, 0x4e22, @multicast2}, 'netdevsim0\x00'}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000006c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x74, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3, @mcast2, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x84) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="520364562790acce58de2c00"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) mount$overlay(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800, &(0x7f0000000340)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@obj_role={'obj_role', 0x3d, 'fuse\x00'}}, {@smackfsfloor={'smackfsfloor'}}, {@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'group_id'}}, {@fowner_lt={'fowner<', r3}}, {@obj_role={'obj_role', 0x3d, 'rootmode'}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x33, 0x65, 0x37, 0x36, 0x75, 0x30, 0x7e], 0x2d, [0x32, 0x77, 0x65, 0x32], 0x2d, [0x37, 0x0, 0x38, 0x7b], 0x2d, [0x67, 0x0, 0x0, 0x7f], 0x2d, [0x64, 0x0, 0x35, 0x7b, 0x31, 0x77, 0x34, 0x32]}}}]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) listen(r3, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7) msync(&(0x7f0000ff1000/0xd000)=nil, 0xd000, 0x1) mlock(&(0x7f0000ff9000/0x1000)=nil, 0x1000) 20:12:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0xfc73, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x2f8, 0x0, 0x5}, 0x7) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r1, 0x22b, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x5, @media='ib\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x5}, 0x0) 20:12:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="972c"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xe5fc, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240), &(0x7f00000002c0)=0xb) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x40, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) pwrite64(r0, &(0x7f0000000080)="57bb041f8878caeac9218d3be83977336aeeff2e326237faa01fa27ef292ec68b8d5508c4e9902e6e6ea49a5fc0291527039dc213b35a93ad2e0e9fd69cae7e7756c3f696f556eb091e40c61fa79e9af5d3ede6900ebe5948532c9fa49b71f", 0x5f, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:29 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x20020000000fb) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x404000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x3, 0x100000000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r3, 0xda4}, 0x8) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:29 executing program 3: r0 = socket$inet(0x2, 0x80000, 0x4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000003c0)={0xffff, 0x7, 0x4}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000240)='fd', 0xfffffffffffffffc) r4 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x4, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000340)={0x9aa, 0x9, 0x7}) keyctl$reject(0x13, r2, 0xff, 0x0, r3) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 20:12:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f0000000100)=""/94, 0x5e) 20:12:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-control\x00', 0x684c0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2000400}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@getroute={0x14, 0x1a, 0x0, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0xc4) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) getsockname(r1, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80) 20:12:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x100000001, 0x401, 0x6, 0x80000001, 0x0, 0x2, 0x19b40, 0x1, 0x5, 0x1000, 0x1, 0x1, 0xffffffff, 0x1ff, 0x4, 0x7fff, 0xffff, 0x8, 0xffff, 0x6, 0x101, 0x0, 0x8, 0x200, 0x4, 0x8, 0x2, 0x21bb, 0x0, 0x8, 0x7, 0x8001, 0x1, 0xf675, 0x7, 0xffffffff, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x2025, 0xffff, 0x100000001, 0x7, 0x9, 0x1f, 0x492ac7d6}, r1, 0x4, 0xffffffffffffffff, 0x9) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f3d30300004000000000000303030303030303034303030302c757365728615393e0000faba29c981e936b25dc40e1e6004f3c07eb8eead052074e3e948ba2333faef773fa45df2087a130db94e93c4cbaa05c0e7deca342513501ce7f87ebd0ba6fe1ab0b7061ffed783284ce3500effcf1e7d9adfbc07d1312ebee505765110991e2b20de0ca6b81bd4baadd0777d57e800805a3cea14f4d168", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) listen(r3, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="48c96b63b27cb4070c462d7d55"]) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20080, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000240)=""/42) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x4, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@rq={'rq', 0x3d, 0x40}}], [{@smackfsroot={'smackfsroot'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r2}}, {@uid_lt={'uid<', r3}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) 20:12:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) fadvise64(r0, 0x0, 0x9, 0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$cont(0xf, r1, 0x101, 0x101) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffffffffffff, 0x600a00) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000000c0)={0x0, {0x5, 0x7}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) 20:12:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) 20:12:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67886f8bfb354b011c85108f606eedd775705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x5d7, 0x1fffc000}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000480)={r2, 0x5, 0x20, 0x80000001, 0x3}, &(0x7f00000004c0)=0x18) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000240)={0x5, [0x7, 0x81, 0x2, 0x0, 0x480000000000000]}, 0xe) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000002c0)={0xfffffffffffffd5d, 0x20000000fffefffb, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) shmget$private(0x0, 0x3000, 0xc01, &(0x7f0000ffa000/0x3000)=nil) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) listen(r3, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:30 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x90200, 0x0) mkdirat(r0, &(0x7f0000000380)='./file0\x00', 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x1) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x48) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75545eee61be", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) rt_sigpending(&(0x7f0000000100), 0x8) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x164, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffff}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x61}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x164}}, 0x1) 20:12:30 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x82, 0x0) write$nbd(r0, &(0x7f0000007480)={0x6000000, 0x0, 0x0, 0x0, 0x0, "a3ef41749fa55a2fdbedbdfc867b0aa45abd977390ea88aaad945b88278c02edf9d9d4d7c060320acc021c64936fe188b48c94ee7de6c5a65bd405004f2510e32f7a0eb6bb02f6b78b1ea580f6b0185947306a84c6c5e7be78"}, 0x69) 20:12:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f3030303030303030303034303030302c757365725f697c3d8a382191c20ea9363376df0817064f9e104080d1020f4007d31653df78c1cfa3f71101a2535eba53a6049b97b9307582d0116e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0x43) 20:12:30 executing program 3: r0 = socket(0xa, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 292.574372] dlm: Unknown command passed to DLM device : 0 [ 292.574372] 20:12:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5}, 0x10) read(r0, 0x0, 0x0) 20:12:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x200000000000000) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:31 executing program 3: r0 = socket(0xa, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 20:12:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x400, 0x0) fanotify_mark(r1, 0x4, 0x8000010, r2, &(0x7f00000002c0)='./file0\x00') pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3000000000, 0x210000) r2 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r1, &(0x7f00000003c0), &(0x7f0000002ac0)=0x10) setsockopt$packet_int(r1, 0x107, 0x11, &(0x7f0000002b00)=0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x2, 0x1, {0xa, 0x4e22, 0x10000, @mcast1, 0x6}}}, 0x80, &(0x7f0000002700)=[{&(0x7f0000000340)="0d1f81e4cc36ae411cd868ca64c67623620a6f78e6d86780021d7a945299e5ec06669b51fe526d706a57935d009c836bdde19cc546c756099cf0c850eaf3265288145d3b19081e7e5f5b5e5e3567a7470796ecccc75c6fcc", 0x58}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="d9661c83f2132713a3e6a9af524b799b160832a67744b9b431be0c3b4c30a045893b0f28d170dcdc2a2bfb774243587154bb858124ffddec20afd0e8c287f1b2b022cbfa7b5c4e4c0115c6a42b20cb26cb97c8d8144c81892506d5798fe21cdffa7ab54672649ef78cfe74ddbe4680273a9c89488e4dd9a089a149b9f83592295e824a253d9e9693b17dbfaafc2641367de337cd08b1", 0x96}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="b7274c05d5beabb85d71520df7ac627ed4fa995a89978402881d29d8123e482db4f5b6410be4af747d9d38d1968f3f601411d8216adcf33fdde2970b026ce662de3d9f018ba9260ac1d52a1ec5d1bd9372caf338961314", 0x57}, {&(0x7f0000000140)="25f4cfa0cebaa0", 0x7}, {&(0x7f00000025c0)="73806beed85abe3729cc0098f37ae33b1b050ce632147dcf70170d161d2c08dbb45e272b957e37860cdf515ffffaf124ab0f5ff4dc15d4ee9980000c65c2f8fa93a85f54009b6bb98bbc8d7605a8be48bbef12e161d7c4df2a3f29d9ce3dea6e2df5848dcedc3b0899b36cf08909dd376bb9c687694fba1c865b2227ca7a01309e07d384a06ef4292a5dee7d58f9faea5dd3177c20cb5d7f508a", 0x9a}, {&(0x7f0000002680)="667c52294ced2d55c820fd40c0b1eecf75b06c4f784bfe8fec7737f18013fd3c9462be6925982e4883ffbe576681224fc3af33b29d0671906b8a41dda4f0b4850ab9f7a94b8887aa258f5e0749c9e4c4748af8b4044040ef", 0x58}, {&(0x7f0000000240)="a8260bca7981570f3c422f", 0xb}], 0x9, &(0x7f0000002b40)=ANY=[@ANYBLOB="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"], 0x2c8}, 0x40000) syz_open_pts(r1, 0x10002) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:31 executing program 3: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(0x0, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffffdffffffefffc}], 0x1) semop(r0, &(0x7f00000000c0)=[{0x0, 0xfb5}], 0x1) 20:12:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="446c352bd7730a55354430a0ff"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:32 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@initdev}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000c40)=[{&(0x7f0000000a00)="c62d982e32eb7ea90c598ed2c33371ebca892da20ece2d428d694466d6ce54be285aa53aaa9f1f77c2fbbf5176187ae119223dee9b89d37c4fc44ad503a1ab", 0x3f}], 0x1) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) syz_emit_ethernet(0x81, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4b, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4b, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c3"}}}}}}, 0x0) [ 293.874621] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 293.922177] audit: type=1400 audit(1552075952.192:62): avc: denied { getopt } for pid=11497 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 293.961451] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 20:12:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5}, 0x10) read(r0, 0x0, 0x0) 20:12:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000340)={[0xf002, 0x12007, 0x7005, 0xf000], 0xaa2, 0x20, 0x80}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e22, 0x3f, @remote, 0x1}}}, 0x84) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:32 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r1 = openat(r0, 0x0, 0x208000, 0x60) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) getpid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000600)) getpid() getpid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000ac0)) gettid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x800) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40001000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, r4, 0x701, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xb35}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x13e2}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) ioctl$sock_proto_private(r2, 0x89ea, 0x0) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3cc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 20:12:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd5', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000380)={0x6a, 0xfff, 0x6, 0x0, 0x0, [{r0, 0x0, 0x8}, {r0, 0x0, 0x1000}, {r0, 0x0, 0x20}, {r0, 0x0, 0x2}, {r0, 0x0, 0x1}, {r0, 0x0, 0x3ff}]}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6404094f102888db323830303030303030303034303000000000003c0a9de9cfe093372e79e7c9fd3f4a16d4726900a8de61a8f027b5d9d9c3dd2799d4a8199320402fbad30f1470840373c858d1946f9304bf007a1d1a3e3508000000000000003ce83aa6047b3e101e859580ebe1f7b02fbeba0777ddbbbee3b3e1039476ed122c7c7585e1ae149871f34c1d0b890d6767a6ec39131150348d8580e38eda03cb6aa611aebd33fe3be63bb89cbb020dc53631882ea962a89507c24dd3ac69a9efce81bc779a5afc0f78d8d092c5a75a2841a6d6cf355e84fe59d6f8ed4242668d40a957f8bd1f05ef50adca933b5a22629c254cb94056b8e1ce88000000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) futex(&(0x7f0000000180), 0x8c, 0x1, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)=0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x3, 0xfffffff5, 0x3}, 0xfffffffffffffd83) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) read(r0, &(0x7f00000000c0)=""/167, 0xa7) [ 294.340264] audit: type=1804 audit(1552075952.612:63): pid=11531 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir775811764/syzkaller.T7fhVd/183/bus" dev="sda1" ino=17044 res=1 20:12:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x280000, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x7e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4885}, 0x4000000) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x3, @random="4278aa37c99c", 'hwsim0\x00'}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="bcf2"]) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:32 executing program 3: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x20002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgroups(0x0, &(0x7f0000000dc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000180)) 20:12:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5}, 0x10) read(r0, 0x0, 0x0) 20:12:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dd605d0314ea8f1853ab6d7ece484d766ed13900510ed5edff7706a67ddcc7716de46b7ef67cf9c84c1c151302ae8a10d146ccfdeb7196197c42116dc07148f147b9f8c27fe17387c06059bbc9265531d6db9c5dc78f171b8def4dfca55a459a9d5d4c79f5703011927d3c53b40a57ee2033e5bbb56a68fd7682ae3b1947691e036d2209126897abbd7", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69533d409ecdbd179cd05df1dd546a7a9e346008e361685df1598c1b26ce6c55f77cfbdaf94a2febd9af3591b3e8146a98c3a00d9bfd54c3c7e4b5f88b9462ba4ed0f3e9cf2f3b9f64b64e49549de76717777e4aea26f9a032f02474801770e6eb949b98e35134b83c5705cedaa677243bd1524e3078e71d04287cf693e7bb7ccf34b242aa3a6e39a11e359c6f5a6b1b959d605cffc9a4c22e0b6ecc3210f71ef252e5557d50094496c804ae19225ee49ad639e3644cc89df2e47e2e57a7495a1cf76dd65738e0f2b9cc09004acd64a6839cf80f2c640d7c74cc0067cc67cb31c32c3e98019bdd85", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x8100000000000000, 0x3}, 0xfffffffffffffc74) 20:12:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0300000000000000003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = socket(0x1f, 0xe, 0x100) getsockname$unix(r1, &(0x7f0000000340)=@abs, &(0x7f0000000080)=0x6e) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xfffffffffffffff7, 0x101000) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000480)="696f5e0a54e7a686581ee1addce011244a256a8f50776f9a43ae64569fcf9197798e5c7631dcbfa73dc7433b97095d342e1e68e29838cdb20da416faf9d4feb1c77e9f80bd9024524574efb2e70576dadef77f7132880e8d7a7bfc16e3e6269bc1be6512717daa459ffd5bed053a0302e2473021f4a586dcd10ad745c3c368f7d4fd6dbeaced39e85926bdd76eb1826e83c0e96dd3b9cf25155c35ed58d9e08039dc4a93fe10654baf05eeabccc364528365e9fdab81fc07eef3") read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000340)="0efd2722eeef89572765cdc01b2608afd19edca4906479ff317755683b7ba939ebb955d194ccea640d4de6a8fdb4e641f524e27a4c7047ff736c1766377824726cd08a192fb402808942e3a35ef8f68e137e1ef92b11dd08616617a8622a3e36b79e738396767225c839f0df56227061cf6fd8e225abcbc41cea4a81c84503d9c1e35ab5710c86cba894b58ef4533b6574e8ff889b3cfc0ed98cc22759", 0x9d, 0x3}, {&(0x7f0000000480)="55f2f3a4b4652e36ba5d2625e35ea2fedbe3a37bd010635711c8fc17db5bed85cb05cc1f841f3336c1e4e0f361a739ab447ed7f29deee280d230755ce999e7facd8fa3b32f08b369a1e5bb8aadf051248df66abacddb91de45c76c0b7dd4d8dad26b4cb1fc37ae3b1bc16c22369df383ab14c8", 0x73}], 0x2000000, &(0x7f0000000500)={[{@lazytime='lazytime'}], [{@fsname={'fsname', 0x3d, 'user_id'}}, {@measure='measure'}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0xffffffffffffff77}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@max_read={'max_read', 0x3d, 0x54}}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x1ff}}, 0x30) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x38, r1, 0x210, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x38}}, 0x840) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000580)=0xffffffffffffffe8) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000100)={@loopback, @dev}, &(0x7f0000000140)=0x8) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000005c0)={0x5, 0xea80, 0xfffffffffffff801}) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) [ 295.360742] XFS (loop5): unknown mount option [lazytime]. 20:12:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000480)={0x3, 0x0, 0x2080, {0x2000, 0x1004, 0x2}, [], "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", "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"}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) [ 295.459495] XFS (loop5): unknown mount option [lazytime]. 20:12:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x200000, 0x0) recvmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000480)=""/228, 0xe4}, {&(0x7f00000002c0)=""/34, 0x22}, {&(0x7f0000000580)=""/150, 0x96}, {&(0x7f0000000640)=""/130, 0x82}, {&(0x7f0000000700)=""/194, 0xc2}, {&(0x7f0000000800)=""/245, 0xf5}, {&(0x7f0000000900)=""/57, 0x39}], 0x7, &(0x7f00000009c0)=""/110, 0x6e}, 0x10120) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) sendto$x25(r2, &(0x7f0000000340)="24e346065aea348b7eebb6c138bd13cad8a3ab9b6bf021fbf4476805ea38a30d2da98ae10e8fed33a789a5dad919becab5ec5899cb49a053ada91d59a0e8b38aef6e8813b01c352e3cbec36264d9c608bd1c2c540b80f99d75a40f141e8f677dd56b7f3fca40f57f0689960d14b9635225eab6c626c07bedd584147d42909688ce66432d9acaeb90b86a0cb54be815dd7e", 0x91, 0x20008891, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/sockstat6\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=0000000000000000004000\t\x00\x00\x00\x00\x00\x00\x00d=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) write$selinux_validatetrans(r0, &(0x7f00000000c0)={'system_u:object_r:dhcpc_exec_t:s0', 0x20, 'system_u:object_r:userio_device_t:s0', 0x20, 0x2, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x73) 20:12:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080), 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x51ce, 0x80000001}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={r2, 0xfff}, &(0x7f0000000480)=0x8) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:12:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x602801, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000100)=0x8fb6) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f107aff9063a0259330ca0b0000303030303030303030303034303030302c75ef65aa0fdde583", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r1 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:12:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x2050, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30080000000000000030303030302f474c1f60e18af3302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0xffffff28, 0xffffffffffffffda, 0x3}, 0xfffffffffffffdf0) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, &(0x7f0000000080)) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="66643dfdc9c5fad84b4edc4903534a21154cbee266db179aae38f81a7075b7fb170b42a18f1fd1cd60b55b2daf7f0942b363cdd733e97c10835fc8b3098add6cdc46e222b3e386b220874489ead6261b70736bba3f91dfaaf6978232b62ab5697dbcb42becd6a099bdeedcbe512e036ed2eec37d2bc1790a78495b1a31761a29d52e6aa44d087fbdd4dd1f8048062ddbdd9da3a19f7e556d56ee406b340abb3d809f74e860bd2cc07f0d9f49eadc747822334f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f0000000100)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40001) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) 20:12:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) [ 296.539956] audit: type=1400 audit(1552075954.812:64): avc: denied { map } for pid=11645 comm="syz-executor.5" path="socket:[43503]" dev="sockfs" ino=43503 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 20:12:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000000000000000000000b9728bf881b25603b1c8f2468993562c73c62159e062a25ae4c80769d2b51b8df6b5716dbfe2a76ae09a2f7ade56bb2031b0b425c9f1eaa9f5e6088aed23bd674ea3c45b17f963ed4b2bfbb0b930e8015dfe129ee64b6b97a0ef392449bae52e70de2d27700d9643ed70e3b99918b70424e706a4c09beafc0e91eeed6d798a0133923316a4121d2395df0c61010fc2f96d3eb112f803984b327b996", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10000, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x40, 0xc6) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d706f179427ec1bb73a93ed91a6a4ec592dc9620d090f72a72611b8a9dc0aa0837577f4d7e57d17539913489a3307fd217c7e821aa2ca1ae71da59e663b6b554b077aed8f54ef5e6725ccefc7d254b63a3f699496c6d24f0db5814c42706fb621ac2f4dc1181a35348f8db6e9c10e602520879e38419884d39e0ac73cd288a530f1fd0ee227802c63bfdecdba369b70aecb8d3053d2e6db41e3945c9e008268d27967ad6892265354f0b15e865d76d84bb53161be71f602b36e899127b0cfc955728c6a6666d20e1c20772fae0e1d99f57a716e1b2e3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, &(0x7f0000000080)) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x5, 0x13e}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffd000/0x2000)=nil) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) fcntl$notify(r0, 0x402, 0x80000000) 20:12:35 executing program 5: r0 = dup(0xffffffffffffffff) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="914448", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) 20:12:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, &(0x7f0000000080)) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757381725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xbc60) 20:12:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfffffffffffffeb1, 0xfffffffffffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 20:12:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0xc4, r2, 0x602, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0x90) 20:12:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffeffffffff, 0x80000) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x6, 0x8, 0x0, 'group_id'}}, 0x29) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000000c0)=""/70) 20:12:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:37 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@dev={[], 0x10}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={{}, {0x77359400}}) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000540)={0x0, 0xfb, 0xeb, 0x6, 0xae, "67d8661728fca196e1c788072ecacc2a", "52fc4eb11da6b60e008f31feeb5d2b91b4567c836fba56f18a657faff39af18bd4cc52ae8112509288535b121e9f3886993de794dd3ed35bcd2c7dec118fb3179604c60b24e30f4ce099f3921c4e89086bdb51be9afb6b954e19280644c0f997aee16732b8aeece951bc70dab5c8144b482902b60f1dc1c7cb19c90b5ff92b443976c383993de099c7fe5feb5b3bf75ee9ad2ca5a1ca4b8bcb14099ad45a0668fa00152452a1d0ebee77850a5df90cbeeed19859171433fe477c2317424b2a7c3d7de9aa019bb8407a0cd502965cb83b43c7d1ab677b"}, 0xeb, 0x3) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000640)={0x0, @reserved}) shmget$private(0x0, 0x2000, 0x54000400, &(0x7f0000ffe000/0x2000)=nil) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x2, {0x0, 0x4}}, 0x20) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x800, 0xfffffffffffff000}) read(r0, &(0x7f0000000480)=""/167, 0xa7) 20:12:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0x54, 0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r3 = getuid() r4 = getgid() r5 = getegid() getgroups(0x3, &(0x7f0000000740)=[r5, r5, r2]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r3, @ANYBLOB="040004000000000008000400", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000400", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r9, @ANYBLOB="08000300", @ANYRES32=r10, @ANYBLOB="08000500188144d99364d6bbb85daf183e81a8420995b3ec2a022b3dc7162d4f6bb459587bbc2472213e966327b55073fa31c8c52ab6871a234863e7ed385f6edb964b7ad3bdb934e9a8864024816d184d008f22a95cd691189eeecb2bbc35a6831cd749d3969110a8ffaa3493d844b3192994e832293f36d543fe66e3d93ab9037653b9826da5d671fa74a6a9a0f377c15cf4b1cde288d755e307a488270379b4f0906d8b75ec40e77c3db780e793048189546f52e3206a6a7ea9ebae95d2d9b5d207ff62e8e3cf4b1a992c195a2b535337ca4b746dcdcc197988a6c832ea0f595a29ac13cae0", @ANYRES32=r11, @ANYBLOB="10000400000000002000040000000000"], 0x74, 0x2) socket$kcm(0x29, 0x2, 0x0) 20:12:37 executing program 4 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2f) 20:12:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000240)={0x1, 0x1, [0x8, 0x101, 0xffffffff00000000, 0x9, 0x0, 0x8, 0xfc, 0x1]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030302c757365725f69643d00000000000000000000000000579981fdc5949508fb059ff1a42bb73369594e7ac36a92846049ff9077bec20228705cc1be24798ffd3b748735ec54b1a6947de2aa92dbaa74877f567443c64a665a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, &(0x7f00000000c0)=""/167, 0xa7) write$FUSE_OPEN(r1, &(0x7f00000002c0)={0x20, 0x0, 0x4, {0x0, 0x4}}, 0x20) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) write$cgroup_pid(r0, &(0x7f0000000440)=r2, 0x12) 20:12:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x242, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x6, 0x7f, 0x81}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2, 0x6}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r2, 0x8000}, 0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6664a2d4edca62512b315145145e117f5284fa41b5f92b3748b945944dfe5a6b092ee1b19eaf7ba88768910c7553afb96c1ef6f7c433da57ae6849ee75e007e78df038c08a84ed29ec2c35ee58f7ad52359d37588dfaac19bc0d2b10f2bcf16bd9", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grotpPid[', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r3, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0xfffffffffffffedc, 0x0, 0x3}, 0xf6) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x2) getsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000000c0)={@local}, &(0x7f00000004c0)=0x14) 20:12:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="040000000d7b5f58ff0f0900"], 0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x9, 0xfffffffeffffffff, 0x80000000}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xead5, 0x4, [0x40, 0xfff, 0x100, 0xfffffffffffffff9]}, &(0x7f0000000140)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x2a, &(0x7f0000000000)={@mcast1}, 0x1c4) ftruncate(r0, 0x3) 20:12:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:38 executing program 3: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0x15}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x2b7}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="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", 0x2d5}], 0x1}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x80, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0xd3, 0x0, 0x7, 0x9, 0x6, 0x5, "7936f942ced63b4309a1895aa2a090d79d1b0c3f8b135cb7e8fd038fc84539a791e08bf16e8b9fcf57e130f01005cb624e931251986bab246d25565f136f55c972da39e6ec94b4df7eb9b5edc6ad76bbfb147a7dfd0a308f2a0722e2a932c3a546bc75a15f901efaf0da974ac248c4abf73809b67052af0039ff22fd73940abdaee0d8c17811f0ac93f9997c625dd34aef60380ecbaa8240643811ad43414858e8f66e1ccd559ef8a1a83cabd3dc76980e1581ff48df953ad447e05408f65245eae7e9cdfc14994b9e7e0cdab7de58b8102b00"}, 0x1eb) 20:12:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2302) 20:12:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd9', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400040, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x9a, "8e11678d91a86414c95ed75bca722640bbbba43c8172e79017f375c51e515507908ea9ace039bb328cb8c9fd0167ba538973198db148e5e9fc1dfeebfe9ff52cbc8fcc0e8041bd5d1d16e3aa7c8decb54ee7b7b62bd56ae6f8f6977ba27993f4f8fcc237af968b2c7b1a8e5ef807d6443575930ddb6a736e42655a56d83d9419cd83ccdff91357053bdd254c0f57b223c33d39adf03ee3e3b4b9"}, &(0x7f0000000240)=0xa2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x8}, &(0x7f0000000340)=0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2f00) 20:12:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000340)={0x4c, 0x3, 0x0, {0x4, 0x2b, 0x0, '@mime_type(trustedem0proccpusetmd5sumsystem'}}, 0x4c) 20:12:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x23020000) 20:12:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000400)={0x3, &(0x7f0000000580)=[{}, {}, {}]}) r1 = socket$packet(0x11, 0x2, 0x300) finit_module(r1, &(0x7f0000000080)='group_id', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x200}}]}}) pread64(r2, &(0x7f0000000340)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) write$P9_RRENAME(r3, &(0x7f00000002c0)={0x7, 0x15, 0x1}, 0x7) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read(r2, &(0x7f00000000c0)=""/167, 0xfffffe94) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xb5f4, 0x2) 20:12:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = semget(0x3, 0x4, 0x2) semctl$GETZCNT(r1, 0x4, 0xf, &(0x7f0000000340)=""/191) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400000, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000140)='/dev/fuse\x00', 0xa) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000480)=@v2={0x7, 0x1, 0x14, 0xfffffffffffffff8, 0xd5, "c5a3dbc6430f18e7ef79ba3f66d4701db0236de73dbb8ef02d7d7906858b67d295c7fbcb0c8820e5c0a23f0db85870c3330ac07cf98884cfcad27791e020ab55661331b32520f2206273fabcef6e0f00c2f5bb50500f95562ef44a7031d2f9c5d51cc10bde332d8efa90351e24a677ef7030216a24fe9ad9536f4e2aceb798ff44719d31ca2fe05711e2eb562f9bc0619b5c805b8dda9422b5d3cfbe1f8833f25b91966aa64c414ab9225bcc683a5bfa79b1482ac9e93c07d900b32f7303ef639b75968fd45ed4c085c1adee71cee78adfcf39b443"}, 0xdf, 0x2) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4a) r1 = getpid() ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x1000, 0x10001, 0x1, 0x2, r1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x13, "896990eadc6ed4127d8297affccc62afa2b146"}, &(0x7f0000000240)=0x1b) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r3, &(0x7f0000000340)=0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00\x00oup_Id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2f000000) 20:12:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) 20:12:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x7ffffffff000) 20:12:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x223) 20:12:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="3d52be43e094d3c81ab8053d9759a7d8536f78a2bb38690cbb99475205bad0dd6f02555bf7557a1254c9f1c72d20e942ab9aa9bceb9b0262c0398059ea0eda7365774c7d38c861d5fb7fb9de05ab0d5ca8552cefda66545472fd657d4b72461db7c50d250d0cbc040625085e120f939e498d9665b2e20b7bde2f8eb273838172c3ec05f40d", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030d00bcca6f63230303030303034303030302c7573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000340)={0x800, 0x101, 0x2b, 'queue1\x00', 0x8}) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x4010, r1, 0x0) 20:12:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0xf0ffffff7f0000) 20:12:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c682a46d62146ca072f88b6087e56aa0ba69a25f0e35eab01efa4b2832d4cbbaac8bbb97b592891ea61db83dc917064da0da17f01de1dcf957d7cac5e055407ed2bd09b29f244788681032827a1f758b73e5096f0d0cea081e012749376d79cfec6635488cf85933ecabf3588dc649664709f3ca0c355debd90c07d8342d48d0b0db77b42709a1f38d178560e12546fc7cd1bdfa2418221923654c72579a103a6f099030781a1a3120b98263998014fbc2cb221034894cb78caa1b780eedc58fe97b7066f507f9d251e28e222e72f49dbb5e9b6c97649424d32071c3efe91380000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) [ 301.522708] audit: type=1400 audit(1552075959.802:65): avc: denied { map } for pid=11925 comm="syz-executor.5" path="/selinux/avc/hash_stats" dev="selinuxfs" ino=26 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 20:12:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, &(0x7f00000000c0)=""/167, 0xa7) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000340)={0x4c, 0x3, 0x0, {0x4, 0x2b, 0x0, '@mime_type(trustedem0proccpusetmd5sumsystem'}}, 0x4c) 20:12:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x5ad02, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x7024400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0xb00, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000090) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmnde=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000980)=@filter={'filter\x00', 0xe, 0x3, 0x4b8, [0x0, 0x200004c0, 0x200004f0, 0x20000608], 0x0, &(0x7f0000000480), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x11, 0x54, 0x88e5, 'ifb0\x00', 'bridge_slave_0\x00', 'rose0\x00', 'bond0\x00', @dev={[], 0x20}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0xff], 0x70, 0x70, 0xe8}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x7fffffff, 0x10001, 0x7, 0x1, 0x0, "5c4aeafdc65a130db6099c1b32d47434c6ff965a805d07954c67d2b4c25474225087706eb8f588ac501c11f3f31dbc352b296733940d70dff456470ab5183e27"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x9, 0x1, 0x92bf, 'gre0\x00', 'veth1_to_bridge\x00', 'ip6erspan0\x00', 'team_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0xf8, 0x1a0, 0x1d0, [@cluster={'cluster\x00', 0x10, {{0xfffffffffffffffa, 0x4, 0xa89, 0x1}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv4=@broadcast, [0xffffffff, 0xff, 0xffffffff], 0x4e24, 0x32, 0x7, 0x4e22, 0x4, 0x20}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x101, 0xabcd, 0x0, 0x0, "38a3e8957d61835d35a7c2395bb6961bf649710f6913d10b95a91fe6c971b321e2c0f00ae577a2ef77e6b28b3809a9e967230d8f0df1d9a13b76cc8b68d5eba2"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}, {{{0x11, 0x2, 0x9200, 'bridge0\x00', 'hwsim0\x00', 'batadv0\x00', 'ip6tnl0\x00', @dev={[], 0x25}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff], 0xf0, 0x128, 0x170, [@connbytes={'connbytes\x00', 0x18, {{0x3, 0x4, 0x1, 0x3}}}, @quota={'quota\x00', 0x18, {{0x0, 0x0, 0x101, 0xfffffffffffff000}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x2b}, 0xfffffffffffffffd}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"c7e485e875828ea1fde00a78d515a23b2d59ef6e0a560a68f4c85df9e0b8"}}}]}]}, 0x530) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2302000000000000) 20:12:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f0000000080)=""/84, 0x54, 0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x80040, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) 20:12:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r6 = msgget$private(0x0, 0x120) r7 = geteuid() fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x1520, r7, r8, r9, r10, 0x12a, 0xffffffffffffff80}, 0x4, 0xc0, 0x7f, 0x80, 0x5, 0x9, r11, r13}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r12, r0) 20:12:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x223) 20:12:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r6 = msgget$private(0x0, 0x120) r7 = geteuid() fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x1520, r7, r8, r9, r10, 0x12a, 0xffffffffffffff80}, 0x4, 0xc0, 0x7f, 0x80, 0x5, 0x9, r11, r13}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r12, r0) 20:12:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x2f00000000000000) 20:12:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r6 = msgget$private(0x0, 0x120) r7 = geteuid() fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x1520, r7, r8, r9, r10, 0x12a, 0xffffffffffffff80}, 0x4, 0xc0, 0x7f, 0x80, 0x5, 0x9, r11, r13}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r12, r0) 20:12:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r2 = getegid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x8, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@hash='hash'}]}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r3, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r3, 0x0, 0x0) 20:12:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r6 = msgget$private(0x0, 0x120) r7 = geteuid() fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x1520, r7, r8, r9, r10, 0x12a, 0xffffffffffffff80}, 0x4, 0xc0, 0x7f, 0x80, 0x5, 0x9, r11, r13}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r12, r0) 20:12:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:41 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r6 = msgget$private(0x0, 0x120) r7 = geteuid() fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f00000005c0)={{0x1520, r7, r8, r9, r10, 0x12a, 0xffffffffffffff80}, 0x4, 0xc0, 0x7f, 0x80, 0x5, 0x9, r11, r12}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x7ff, 0xf, 0x5, 0x80, "5abdd0d95b967601e735ea8ff37f4780d216fe8981379328bf88cecee8ef8992"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000240)=0x9, 0x12) futimesat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{}, {0x0, 0x7530}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r1, 0x0, 0x0) 20:12:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) read(r0, 0x0, 0x223) 20:12:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000009aec96a881ebde60c0b0304c7ffcb0aa7cb332ac72eb53bb768e377490db160f33561f8cc90bd60007f40d1f1a6baac824acfe271dd242cdd39f4763c17aaadbe73209bffa7c040b1dff57eb108d4fee44dd083599f24358ed6cf1797fe8331a1d3d95d75c94923866bb88523", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0xfffffffffffffe07) 20:12:41 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() fstat(r5, &(0x7f00000002c0)) fstat(r2, &(0x7f00000004c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000580)) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:41 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:41 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() fstat(r5, &(0x7f00000002c0)) fstat(r2, &(0x7f00000004c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000240)='/dev/dri/card#\x00'}, 0x30) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = fcntl$dupfd(r0, 0x406, r0) accept4$alg(r1, 0x0, 0x0, 0x80000) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:41 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() fstat(r5, &(0x7f00000002c0)) fstat(r2, &(0x7f00000004c0)) getgid() ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:42 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='user_id', 0x7, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) ioperm(0x1a1, 0x80000001, 0x0) 20:12:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() fstat(r5, &(0x7f00000002c0)) fstat(r2, &(0x7f00000004c0)) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:42 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) fchdir(r0) 20:12:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() fstat(r5, &(0x7f00000002c0)) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) geteuid() ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) iopl(0x9) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x102008, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c447eb4d4a964160ef99c00000000000001003d", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66737472616e736d7574653d757365725f69642c6673757569643d7f347732777963372d633661362d767c00672d767330002d3833353b653761612c736d61636b66737472616e736d7574653d2e76626f786e6574302c00"]) getgroups(0x3, &(0x7f0000000480)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x170, 0x0, 0x7, [{{0x1, 0x1, 0x7f, 0x3, 0xa, 0x8, {0x6, 0x8, 0x6, 0x4a4, 0x9a0, 0x101, 0x1a, 0x9, 0x10000, 0x0, 0x7, r1, r2, 0x7, 0x1}}, {0x1, 0x3ff, 0xa, 0x40, '/dev/fuse\x00'}}, {{0x6, 0x0, 0x3, 0x7fff, 0x10001, 0x9, {0x3, 0xfffffffffffffff7, 0xfff, 0x800, 0x8, 0x100, 0x4, 0x1, 0x7, 0x4, 0x8000, r1, r3, 0x9, 0xffffffff}}, {0xf920, 0x5, 0x1e, 0x6, 'wlan0securitytrusted^vboxnet1\''}}]}, 0x170) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x129081, 0x108) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000440)=0x9, 0x4) 20:12:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) msgget$private(0x0, 0x120) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:43 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='io.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) epoll_pwait(r3, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x7, &(0x7f0000000240)={0x7}, 0x8) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000480)=0xc) getpgrp(r5) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="660080", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r4, &(0x7f00000001c0)=""/84, 0x54, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$PIO_UNIMAPCLR(r6, 0x4b68, &(0x7f00000000c0)={0x7, 0xfe0a, 0x10001}) write$FUSE_INTERRUPT(r4, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000004980)='/dev/media#\x00', 0x2608, 0x14000) recvfrom(r0, &(0x7f0000000480)=""/4096, 0x1000, 0x10100, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000049c0)={{{@in=@broadcast, @in=@empty}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000004ac0)=0xe8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000008, 0x10, r1, 0x2b) read(r1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x14000000000000, 0xffffffffffffffff, 0x9, 0x6, 0x986}) signalfd(r1, &(0x7f0000000080), 0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x7}, 0x4) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x77359400}, 0x10) 20:12:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can={0x1d, 0x0}, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r4 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x13, 0x3, &(0x7f0000000100)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x30}], &(0x7f0000000140)='syzkaller\x00', 0x81, 0x9e, &(0x7f0000000180)=""/158, 0x41000, 0x1, [], r3, 0xf}, 0x48) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) geteuid() r1 = geteuid() pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000003c0)={0xf3, 0x3, 'client0\x00', 0x4, "82973a71dc11b5e7", "c8a3617d73f40d3d631fb1226bdd4e89984974389a1f00d80ac36cab78438277", 0x1, 0x4}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x4000000, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000340)={0x10, 0x0, 0x1}, 0x10) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='bond_slave_0\x00'}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x42, 0x0) ioctl$BINDER_SET_MAX_THREADS(r5, 0x40046205, 0x7) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x223) 20:12:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grouid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x44000) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000780)={0x8001002, 0xfff, 0x2}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x223) 20:12:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="c1261497df973b4cd5ad5a644e85612be07316ad49f2fae5b27f1ed01adb7276470a4947a34a2be08629e934e0a8bb2bd0312906d6a73049f8425da418949e5036debb0434168bf2853c62dbd812554677ad0a26a9e8826a000000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x0, 0x14881) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x223) 20:12:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x50, 0x1000000000000) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r1 = accept(0xffffffffffffff9c, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000700)="8b869a9dcc38362875df9b71f0ea4a48", 0x10) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:44 executing program 4: syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xdc, 0x181400) r0 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x420000) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x80002, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x800, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x24040) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x2000000000000001) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0xfffffff5, 0x40000004}, 0x10) read(r2, 0x0, 0x0) 20:12:45 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) accept(0xffffffffffffff9c, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}, {@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}, {@permit_directio='permit_directio'}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:45 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e21, 0x6, @local, 0x6}, {0xa, 0x4e23, 0x73, @mcast2, 0xfffffffffffffffa}, 0xff0000, [0xb98, 0x3, 0x63, 0x2, 0x196a, 0x12c, 0x5, 0x6]}, 0x5c) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x40100, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000800)=0xe8) sendmsg$nl_netfilter(r2, &(0x7f0000001e40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001e00)={&(0x7f0000000840)={0x1598, 0x12, 0x9, 0x400, 0x70bd29, 0x25dfdbfe, {0xb, 0x0, 0x3}, [@typed={0x8, 0x4e, @str='\x00'}, @generic="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", @nested={0x254, 0x10, [@typed={0x8, 0x88, @pid=r3}, @generic="603abe150cb1f08b6290086618beb628f23f628d73b07bc1e73bd0e6c974cfa72d9bba4c9dc3d417160aa180ca5447a2f58c96d96ce92fd73ddfde26806a5f91b270edb26d950f5e12d10911d7d5d963acd36c3ccc7a7ec76184a8caed235b402ce548eecfa643d1a1170a15306401d097d0cb2d7e02ff9881d9f084a0e1b9d6906e3b42e9584eec4466a8b293cf2cf1d6638c7477360d066ce515", @generic="745747c98204880cd02ecd5dbbe6a4f5bb84836e7410c7a53de288b5cebbb5619611c8ab2c895839add3db04900a08b7d3f31da3a2c9a2c64b31bb3baeae66aa98e589110b456b28c004683d4d3de60f52d4cefb5a1b05246b6cfaa6be2faf5d2ba3ecbfa4d76e5c0c0c74b1c16f7710a052d1a7a8bd55bdea9b1a4510c2c0dbab21dcf8c13a97e2a933f4fb8d200061f68f6bd80282cab3513575561fa84a54e245717cce4ba3498e4db88fc4c85fa34a025f4608bfa61169955c22e0d0429495623d6f9a28d5724e226727eccbf2e0bfcb1d9e84f272379e5fe626ca382a9c", @typed={0x8, 0x12, @uid=r4}, @generic="8f71d2740a52e23b4826d3b889db9ccbc6235b8a06b0678b18dd7f5c8758680b18dc04f714141ba35e5ac7088026265ae5baa2c6c1fa04cae4d8d040733d8527bbd626d8a74ea954407665d5dbdc863c6490c5efc09138271827d1c5b5cc8ed400ae81adfb3c0b1ea7c284978b63f025da53346c0c66e01e911bc99c2fc0084652604255f9482b9c1f3a4c461f10d72a465945a5deb84108e52f555acb01ec", @typed={0x1c, 0x6a, @binary="1f8beda25261b7a32e76bf76f5d300b44c81ac44a19979"}, @typed={0x8, 0x3e, @u32=0x9}]}, @typed={0x8, 0x36, @fd=r1}, @typed={0xc, 0x69, @u64=0x5}, @nested={0x2f0, 0x5, [@generic="8c713f8279b91297b1cb570f6685f9f4f6ad00c856e633d22a5b8e5e6a1ff2ed7568d57f48778eafb6c7ee353d31a68aef2163886f4e9e37325baf2073916e996f1aad9cc7e04299a65ef249e171abc63c9f903234fc3dee2332c515a61bef19f6e7c7fc3c33c3208a4d7cd1baf097e31cd8e80db94295c034e8559f2271b232c9bb33051b6f4dd2c3e5a40c4c5a1ea5867065fd18", @generic="573eefa5a0c0ca10fe25535ff99b11cd626a6c0782cebe3dd4df3fceb7e9fdac30a533bd98193ed34e0278501120c9deeb838c8694618110", @generic="627f1acd425cc058f55e0511108ac1ea1052e5dbb1d25a32b71136274ad53a1a9a8063da93f082842831ea580e183751f3c5695bb5d4077cc40c8830f2e96fb7b1ff4704b5e040190f9e2a4d589741af600f5fa6dae493f0eb814bf034810acb12eee29f642105e9555c2afd986aafed8126f440116ed1bb96473eca9835fd06cfd5f2a9de1877e4981c55fdf83552858ab39a91891e6fcadbf5bcbb7f8bc95cd24f1e6f0b475d0605ac57bc5d077863eebe20cead9eb344ddf88b7ccb0fceb348193613ab2c8bed253272b40460283726f7", @generic="11287f62e226e785e624fdfbaea3ef5143c84047e4090b22ce9aceff60ef1115d4026be98a26ed3f81d0af738d1c3f71a16f1a18ea84865c64483bdfc85f385f5d265d87b5674c6371cc17e3597d82faeb1ea152c7e9606ea31ae0f852c16bc0c245dc4f291e2908b29a4d18a19f3072d560f41f166e40d3215f2e2da7d347b90162ed5eb138a46ff0d6eced7e6a741671815f16510a447f2d3f926cb3eaef77b5553c468e6ae03e59f29b535a1015f658bc87251eefd3560a75808088e7895aaa70874a1d1549f4a5361adc71e66dbbe5adce", @typed={0x14, 0x81, @ipv6=@empty}, @typed={0x64, 0x3f, @binary="5700094dd4b86e6624ece5bc6b7b285cd0b9091fd4cf96de39f1a3f15b6c23350b2705d63d267ed240de6dae213a2e71c3799fc099fa387cec28fbb6a78842f5af45fe2aa28d5a3c59b7fab5d5cbe3daef0356457c667208290dcdca45"}]}, @typed={0x8, 0x18, @u32=0x80000001}, @generic="7e6a4ae465572623208627354de2e997", @nested={0xc, 0x77, [@typed={0x8, 0x25, @u32=0x9}]}]}, 0x1598}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0c67726ff5705f69643d492f30dbe63fd35a1c4671a338714d78551aba48da12d08d7edffa397d6d31e678f975abe561bcb5c5e9fed48193ae4ee1bcc6c22680c78d9d6a9bc37f25756b6de03655962a3b17c0514fd6994f80eb1d2b3bb3743686e842ef2cbc8bef6e35eb4c5b6dec27c77e6ec5d2c5e31bf639ff59eaec8c406dd13ae931eeb7f12494d66e43297b0f06b4bf2a96d0b133e33951cca7c98070589e7d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x1, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000340)={0xff, 0x5, 0x8, 0x80000001, 0x6, 0xfe6, 0x2, 0x0, 0x0}, &(0x7f0000000380)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000580)={r6, 0x9, 0xe9, "b634ce2f53caf6006d29485d7511dedd980db11193e5eb2007a6904217d493ce8dffc59387437ab564ba1470edf764e11dddb7c18a861abcd83ed3f2fdb5c57135f5ae1e17244c1c8a61969c980f14d931702e2801e5198d9a66077c8873350b82d60f033b4f388e5fef531a41709fb082bbc008913d4530c54a48e2e92f69a357d3cf512e2d85557c9a8e7fdeb7664931f6d053c90ddb04002c7615f85e5e3891d969c67541424afa5147e1b5770ce86975aaa986fc5685b3ae54abe9c7aa5ed6ce1748d3f26060b26a5c03936b7699374c16a5eec57de7e2ab3fab077ff7ba75fbe31657ee246b14"}, 0xf1) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000240), &(0x7f00000002c0)=0x4) read(r1, 0x0, 0x0) 20:12:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:45 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x359000) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00040000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0xfcfd472e) 20:12:45 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:45 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:45 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x8, &(0x7f00000009c0)=[{&(0x7f0000000480)="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", 0xfc, 0x1}, {&(0x7f0000000580)="42a51172c095d52a8d2bfbae7f28593daa073ab95f8c36168681e333db1d31237c43d9b437284af20f7dd3fa547f21fcf27e081dfc317c74308142c5f6dea3384269b3c1f923d486f2a8490b399d62156fb1f7a0d50c203962b0df269345e0f0b4a0565a32c3d63400d248e9f024587dfcfec6739a03ec9951ec8656ccf6eb33a2c560c8a9d8deaf40744dbfd13b884104b6c6bf7a71b5859839b8a5eca126f3b29116f00ccd5a58338580fdc74bc9f85f31c6e3727fe9f2af0096aed9b23295f786bbe27ef355369763815cd9f6a077c932a6d961312a2867d231b63c8d01198cc983bf02148df2cd620c", 0xeb, 0x1}, {&(0x7f0000000680)="8332a774db7712d25d934f250d8878d7870c76d0b75015e6c14ac6a020a206ce4ecb907043fa5a93896b343f030dab6796e75fff9863422f76b34fbd67b817e286788517b6e548b7f01cb5f2f69c75cf9d942d76028a7b2565dfa3c968b1b916dd7d98dc30883718624553f8dd1f6ac4b85db3cb0c7be749a813c0d471b42c03e17b31bb6a628ff0fddcacb4ac586a239910668e9cee8773efa34bbcc33f42e8642d50cb093dc91ad304e314511df132e8996e675b0f4a048324720cc8486913895b590fe7b4a7a7cabff4889201d5d4f7493c5d81f4bc3f0b661946c75a8c246b", 0xe1, 0x81}, {&(0x7f0000000340)="bbdee396eb3ad77f3f66de46b5d10b5ea6a95750405018c52aed1227266fbc6b963331a04d45", 0x26, 0x5}, {&(0x7f0000000780)="d6bf8385784b595a2967c27189d344632e963cdb36b5941e495fcec1d59dc35f690697fcf52e4f8592c4e42effd7207c96d3222bf3e1a6ee5146f3bae55180d95559183a3b734807f201029ca464dcc18fe714c2d4b4ab56cb899d136e06bdb332c6e26eac368727a57e18eaeae293fccb7d8431f2f7eef805b719a47cae7adf63ea525bceb19fd673419542e303cc70ca38e581eef406a9f5a95e502551fce513260da14529c0cee9d2bea58fa1bebf2a2a1769", 0xb4, 0x3}, {&(0x7f0000000840)="1e2f43e887f091bbe44d058e009b48924d29f6d2e14395d75c0579691fedec14ed796709d1f1e0b1624420e74db2fa51f0f4ec767f6d76f800cd9d0ae156412493844545aca66d84b65f2c91d11429019ee9969add4b859935b70e43df160ce5b6c6bf6aa8e48b6f337cae7fc7c523c0ffecfd059591204324fd0fba180851c7f9bcf1a582898bd571094015877284ee67965d645236e9a93d47c3ec208eff78d254f579c383d9adb4e377bb7aa596190d566861513d9dfb2271b9e1", 0xbc, 0x1}, {&(0x7f0000000380), 0x0, 0x4}, {&(0x7f0000000900)="aa0fd07e7e3d315a61f632cf7f9f45526a276e73086f0c456d7ff2d5aadcaeeaa0ad1c8673423a81ad8914485979057e6594848746858ab20a8907683debebdb072980ca3b9f788991d3d884cd3d6f90a670b299acae21e9187d46d0e6e1942044bc51841a3ddff7b63024a4f5c4c6b362121a364b69b94b03367b0391e904c816071d6bb19a347b39eded7765620c49610266c95d655e20dd", 0x99, 0x9}], 0x80000, &(0x7f0000000a80)={[{@whint_mode_user='whint_mode=user-based'}, {@disable_roll_forward='disable_roll_forward'}, {@nolazytime='nolazytime'}, {@lazytime='lazytime'}, {@fastboot='fastboot'}, {@whint_mode_fs='whint_mode=fs-based'}, {@nodiscard='nodiscard'}, {@fastboot='fastboot'}, {@background_gc_off='background_gc=off'}, {@extent_cache='extent_cache'}], [{@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x3) 20:12:45 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) r2 = getpgrp(0xffffffffffffffff) getpgid(r2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:46 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f00000000c0)={0xdaae, 0x6, "a01e1687517001a59858a759c0b5e469789504d97358efab1ac8cb57d499f050", 0x1, 0x80000000, 0x8000, 0x1000, 0x20}) mount(&(0x7f0000000240)=@md0='/dev/md0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x800000, &(0x7f0000000380)='wlan1trusted!\'\x00') mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1c00"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2351e7e3, 0x802) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:46 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:46 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getgid() r1 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 20:12:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0xfffffffffffffe7c, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:47 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:47 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200001, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) r4 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000580)=0xc) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) r10 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)=0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000ac0)={0x478, 0xfffffffffffffffe, 0x8, [{{0x1, 0x2, 0xfffffffffffffffa, 0x3, 0x8, 0x3f, {0x1, 0x50c, 0x984, 0x957a, 0x5, 0x100000001, 0x2, 0xa8ac, 0x8, 0x9, 0x0, r1, r2, 0xac, 0x7}}, {0x4, 0x400, 0x8, 0x6, 'group_id'}}, {{0x6, 0x3, 0xfffffffffffffff8, 0x7f, 0x2, 0x3db2cce6, {0x0, 0xffffffff, 0x7fff, 0x64, 0x8001, 0x7, 0x0, 0x4, 0x3, 0x3, 0x6, r3, r4, 0x3, 0x7}}, {0x2, 0x0, 0x15, 0x1, 'vboxnet1vboxnet1!ppp0'}}, {{0x4, 0x1, 0x80, 0x1, 0x4, 0x2, {0x1, 0x2, 0x1, 0xfff, 0x4, 0x3c2e5043, 0x8, 0x7, 0x3, 0xfffffffffffff800, 0x4, r5, r6, 0xfffffffffffffff8, 0x100}}, {0x1, 0xde18}}, {{0x3, 0x1, 0x8, 0x0, 0x5, 0x100000000, {0x2, 0x4, 0x200, 0xc1, 0x54, 0x7, 0x3f, 0x10000, 0x8001, 0x8, 0x80000000, 0x0, r7, 0x80000000, 0x1ff}}, {0x4, 0x81, 0x5, 0x3, 'fuse\x00'}}, {{0x6, 0x2, 0x2, 0x3, 0x1f, 0x7, {0x6, 0x54f, 0x5, 0x1f, 0x6, 0x100000000, 0x2f46, 0x2, 0x80000000, 0x6, 0x3c, 0x0, r8, 0x1ff, 0x2}}, {0x0, 0x76, 0xa, 0x1ff, '/dev/fuse\x00'}}, {{0x5, 0x2, 0x797, 0x3, 0x4f95, 0x7, {0x0, 0x3, 0x2, 0xfff, 0x0, 0x79, 0x1, 0x8, 0xa3d, 0x3, 0x8001, r9, r10, 0x7, 0x92c3}}, {0x2, 0x56, 0x0, 0x80}}, {{0x6, 0x1, 0x7ff, 0x2, 0x0, 0x19a7, {0x6, 0xf4ff, 0xffffffff8ff150c1, 0x4, 0x4, 0x9a0, 0x20, 0x40, 0x7f, 0x80000001, 0x6, r11, r12, 0x1f, 0x2}}, {0x1, 0x1c4, 0x8, 0xff, 'rootmode'}}]}, 0x478) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r13 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r13}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r13, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r13, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:47 executing program 5: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:47 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x4004, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643db688477fb568d08826eeb2fbe26b6231f39c444ab29709f07330fbecf4f1f85a09c360a51afb3c0145fec78c27d0ca7763c0dd7e324aaf12d7619dae5bab8e54f3be966fc00ea459653188545e19210488f4556c3a6d8b6efe604cb4f035571354b1204d99ef948a8530a54d566200f95190be82c4aa8136347ca28418306e27ec505dc0abef262fcc7f35226c0737c110413d33c9f33293e83f5b289a7244ecb0b059eb9bf897ff0bd847c67a9b76cd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e00e505d9ce7fe72d72353525049ea5bb0119e8"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000480)="b7b2bd92087ad3522e0888f29a7ead75153b7d1c3540b5631c7b76489ef0ec633c34ffa3a85ef25b645270364274253e1cec10ba07e49dc3b8166f84f8b842727fa302e3112c9e9105d6442bc6c9032ba0595c4b3c45aabba2da55828afb4a5d7c94a7d23a8f7d51542ee915b7b5a2923e10d834ac994b300020ed811896971da9805b4acfb4b2379eb8aa92a39c57e88add3ae63e0724e4d0f4e3389b4500ea76514c7ac6390f608aec38ca34ca60ca09865a259bca4879170b452da2dda08bc24f769f875149b28874e64f170a16422ea75ae5a965476874aa5f9093de9c69", 0xe0) read(r0, 0x0, 0x0) 20:12:48 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:48 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x22c, 0xfffffffffffffffd, 0x3}, 0x10) 20:12:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd5', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x400000) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000340)) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x401, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, [""]}, 0x24}}, 0x80) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000380)) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f00000004c0)="28b20240fbc4bc3a6e94e2cc45d649a1ab79ca440b1136f91d05e352695289297aec0d0f4f7b0705b5058609a67a56ced5e2d6a428bfd5eb384613fa16f46560784228f8eaa32b29f2eaaadfdb3218f6ccd7be1892efe3ea1bca867b21f2deb05ac0abfed39fc50766d000f107194c8482ac9b8fa73b59836a8bc6a9d265572488f78a3a7bda950a183215890f2b38b7cab5187f442a9ef64e6fdd7bd3ea7bf7af8a82973ce09b0be7af34e6f803bea8cb8a0800bc0ed0b85c9fc811134684dc0f259f7f", 0xc4) 20:12:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:48 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) truncate(&(0x7f0000000080)='./file0\x00', 0x5) read(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x60000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0xadf2, 0x4) 20:12:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x7, {0x0, 0x7}}, 0x20) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:48 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='f`=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:49 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r2 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:49 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0xff, 0xff, 0x3, 0x81}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d564021a71d40209d7f9a8e884d4ceff9091ff51b678bc542bbe8c73706d5f207223d117477563d2074dd710c8af1f1a59db24c4dea557d0f37f2c810fae6cde37b2133036c1d2439dfcbfe4375080250b0ec53a9b9e11ad19a9ee73f1f71162e94e5b9d746d2233a16f9850b0bde7115c1dc7c995330516fe3e121fe7ec392a51cedc8a24df6f7a9a28357434d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de19e1ce42a7a523978ef78f20ae2132657a981eb6da480c37ffa99e7a2bd330598b57b26cd919589fb985f182fedb4ef0c5a367d4b5537a6a10f66286db729e45b13c51df776d56b227220f9c280e59ae1112676a1ef687da4f815a534892e325af716222031645875bd25fd25c31f42a22adfdccf7d5e4240a053bdcbd56a5b97be8a4fb739df74aa2aa0c6c1bdb70311d88f3abcb234aa71f769108427c99a8a7ce05ccce9ac1f812aef", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4f, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) ppoll(&(0x7f0000000580)=[{r1, 0x2}, {r0}, {r2, 0x1}, {r2}, {r2, 0x80}], 0x5, &(0x7f00000005c0), &(0x7f0000000600)={0x7f}, 0x8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r3 = geteuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000240)='./file0\x00', r3, r4) read(r1, 0x0, 0x0) 20:12:49 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x7, 0xfffffff2, 0xffffffffffffffff}, 0x10) read(r0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x20010, r0, 0x0) 20:12:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) fcntl$notify(r1, 0x402, 0x20) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000480)="9bfbd7751e85d6eaf1a9002ce2a11a74edb9dd86500a0a33ca239ada028f23374a9b06e1d0c732c299f20d8c097f018c53c5972eaf26257463a6e4e2ef1cc55b098f100c5c1956d78327ff239eb1aba787a85150b04fd7ea86eb35d4b9dea0a59a9969d5ad9a1fba12649023904f84fb7ed956beb10dab42639ad1aee8329ac8391a677df70a3f24a2e1f5e2926a0ff4ea7aea1b1c4c0e89bf5c914ea35d88eaa9c1624e587a7e37887376a7ac3378ab687cf0b1e280d2407a57f99d0859279ed95242a04541879bf350574593f134530f43fda32c48c7e601031c289db3af73e235801cc72d8720e57e", 0xea}, {&(0x7f0000000340)="af313b36e6a8165cc057840553427fa2ea38e2c9a5341ffe5e6d55bf46d9c22fd03983ba053e4ac194b1a0afa159ae3094d75c7268c41e79c8a6ebb8bee18fa9dd7504f25aed2e541926a19f081223b3511619efb89ba4af856aa1e9417add56e8bf0849664d3bc1229c65979a175e6a0aeec04290f1c5ead801de5c81182ffb9f485b8ecb65db39f30965606d667fb7442fb0a9c7a3fbf4671c4319378d06435d7de1093a5e", 0xa6}, {&(0x7f0000000580)="cff60c2685f1d07a8e54967f4fc99b05bed29f9272884262a49e1fce7ed83ffb83fca8534974836c9aff88a69edf9d6b2732ba1dd55c9041dfab4e39280c8eae1cd800333bb35fc4bed14cc2511d8742078ee6a543ecfc5d78d2c45e12f6e1423b3feb9d4be7c8be58974a8f8530344213d8df2e4c5f54f0aaf25da1ad48fb79268b939bd10b30bc", 0x88}], 0x3, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'osx.', '\x00'}, &(0x7f00000000c0)=""/39, 0x27) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r2, &(0x7f00000001c0)=""/84, 0x54, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000640)={0xfff, {{0x2, 0x4e23, @remote}}, 0x1, 0x1, [{{0x2, 0x4e24, @loopback}}]}, 0x110) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:49 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 311.456785] audit: type=1400 audit(1552075969.732:66): avc: denied { map } for pid=12410 comm="syz-executor.4" path="/dev/fuse" dev="devtmpfs" ino=14704 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=chr_file permissive=1 20:12:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff}, 0x10, 0x800) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x6}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$vivid(&(0x7f00000003c0)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000580)={0xfa15, 0x31424752, 0x9, 0x8001, 0x3, @stepwise={{0x6}, {0x2, 0x8}, {0x6, 0x1}}}) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='numa_maps\x00') r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0xe0, r4, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x17}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xab54}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe11}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x37}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x11}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40001}, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r5 = dup3(r1, r1, 0x80000) ioctl$KDMKTONE(r5, 0x4b30, 0x5) setsockopt$inet6_int(r5, 0x29, 0x7, &(0x7f0000000100), 0x4) 20:12:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d73ea07ff6600000002aed6b8d1c986037eddc34f89ad3c3d3713aeaf6bfe17029c94d36d38a31a6df7e7439fd4c7a2647ba816f081a439f5b40d5e28daf60e3a13b9426b097f90410953da6ce01f9cd4e1c9d99e12683852638b98557d585c0aad5314d9aa7237ad9dfaba5e2be5f83dea286b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x84000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000400)={@dev, 0x0}, &(0x7f0000000440)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@deltfilter={0x3c, 0x2d, 0x400, 0x70bd2c, 0x25dfdbff, {0x0, r2, {0xfff3, 0x7}, {0xffff, 0xffff}, {0xffef}}, [@TCA_RATE={0x8, 0x5, {0x5}}, @TCA_CHAIN={0x8, 0xb, 0xfffffffffffffffa}, @TCA_CHAIN={0x8, 0xb, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 20:12:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000080)={{0x3, @null}, [@null, @remote, @bcast, @remote, @remote, @null, @rose, @default]}, &(0x7f0000000100)=0x48, 0x80800) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000240)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2, 0x64}) 20:12:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:51 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x4, "14cd8f051bb4123dd57dc76234ad55486b4aacd932097347a4de50601954e8cb", 0x2, 0xe954, 0x5, 0x10, 0x5}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64654b3030303009ff1321439b6755e83030303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',func=PATH_CHECK,subj_role=}wlan1vmnet1vmnet1{,smackfsroot=group_id,dont_measure,smackfsdef=]system,\x00']) pread64(r1, &(0x7f00000001c0)=""/84, 0x54, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @local}}, 0x58, 0x9, 0x77b, 0x9, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r2, &(0x7f00000002c0)=0x4) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) ioctl$int_out(r1, 0x2, &(0x7f0000000040)) read(r1, 0x0, 0x0) 20:12:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x1c, 0xf356, 0x1000, 0xed9, 0xffff, 0xe76e, 0x100000000}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:51 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000480)={@null=' \x00', 0xf, 'syz_tun\x00'}) 20:12:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f6732b97e72e3c8bb4f155f6b8649a6171fe94a7393b1522c82917a0ea72ec8fb62f693aad6db684bd2f7dafe4e6534322f0c280a141352ab7d30749d41f1c84fe38b8e6ed752f52d4cffc73938976c5dcd8b318d3917d2d9ade2c53083ae3ea306389626ac2bf36f79c19ed626d2540c0896618512c5aef"]) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000001680), &(0x7f00000016c0)=0x4) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:51 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c001532c06d7f3ae2ab5ae554cef342e86db1c6b8dfd3d82af849af0f0333124ad51171af162a55cfcd2b978fff8aa228c94f6a32fb85794012c2d0ae997e58842b9acdc061660fd32f7665971d8b0c41fd20c4552fb38f53eb226c8cc28450f38ba1bf63915624b61da150310a515cf69768a32d1d4a9039095fb8b106b252199dc0b3dc7caaf542d80bbf453ae108c869931968161983bd02ae06ca3d75b88202e9310350314b9aac90532243747dffcb51"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x2}, 0x22a) read(r0, 0x0, 0x0) 20:12:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4000, 0x0) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)=""/238, 0xee) r2 = getpgid(0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:52 executing program 5: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:52 executing program 5: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) 20:12:52 executing program 5: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 20:12:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x452881) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000000c0)={0x9, "04134f0e8e194a597e22d3e7c8c919e347a2138784aa67dcfcaf57a1786e67f4", 0x0, 0x9, 0x5, 0x9, 0x5}) read(r0, 0x0, 0x0) 20:12:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) fchmod(r0, 0x100) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000480)={r2, 0xa562, 0xfff, "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"}) 20:12:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 20:12:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000340)={@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x14010000}, {&(0x7f00000000c0)=""/170, 0xaa}, &(0x7f0000000240), 0x8}, 0xa0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 20:12:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 20:12:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x5, "2bd7"}, 0x4, 0x3) 20:12:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 20:12:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000000c0)={0x20, 0x7, 0x101}) 20:12:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 20:12:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x57, 0x0, 0x0) 20:12:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) 20:12:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 20:12:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) fanotify_init(0x44, 0xb5930434c6160d41) 20:12:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x20000000007ff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000340)={r2, 0x3b, "e4af54e59ec8596d6a67f3d0423a495f68dd2f7f0a0c786a5a8078387689957f31477700aadf03d3b1670e194a28c290dee8eb1a876af1e60cb811"}, &(0x7f0000000140)=0x43) 20:12:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grouid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x44000) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,userHid=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) fcntl$dupfd(r0, 0x0, r0) 20:12:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d4b64653d30303030303030303030303030303030303074303030302c757365725f69643d85611868efd37a98b4dd8ec2ca5888ad34ebdfd0dc2a253dbe66e9d6d66e64926ed0dceab1c81ffb123d345c8d2e56f027acafdb935997877b57956d7e6a17dc76bfe2f086a0967e01ad1b2845c2c997f4a1141079fa2b0cf92f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x57, 0x0, 0x0) 20:12:54 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file1\x00', 0x400, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) 20:12:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d80)='TIPCv2\x00') r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x100) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000380)={0xf7ddf60a336c04a, 0x5c, &(0x7f0000000300)="8f757cb290f09e94bd0f13d30ee333e837d0ef1e5ed1e192d0410a2bd4a95b57ff95c89c7f605bb6932f85dea2d433c64625c7d86282a566bacae7dbf530e1b21dea841d0e5fffb317f46038726c45a9204f9cbd75ae5e486b5a4118"}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000100)=0x1) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000180)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', r4}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)=ANY=[@ANYBLOB="b1c3a9dd", @ANYRES16=r2, @ANYBLOB="210100000000000000000f000000100007000c0003000000000000000000"], 0x2bf}}, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000400)=@req={0x28, &(0x7f00000003c0)={'ip6gre0\x00', @ifru_ivalue=0xffffffffffffffff}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 20:12:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) [ 316.669986] FAULT_INJECTION: forcing a failure. [ 316.669986] name failslab, interval 1, probability 0, space 0, times 1 [ 316.695032] audit: type=1400 audit(1552075974.972:67): avc: denied { ioctl } for pid=12645 comm="syz-executor.5" path="socket:[46497]" dev="sockfs" ino=46497 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 316.749577] audit: type=1400 audit(1552075974.972:68): avc: denied { getopt } for pid=12645 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 316.771609] CPU: 1 PID: 12649 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 316.780538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:12:55 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x100000001}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e21, 0x1f, @loopback, 0x3ff}}}, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r2, 0x40047452, &(0x7f0000000000)) 20:12:55 executing program 1 (fault-call:2 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 316.780545] Call Trace: [ 316.780629] dump_stack+0x172/0x1f0 [ 316.780677] should_fail.cold+0xa/0x15 [ 316.780701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.780763] ? ___might_sleep+0x163/0x280 [ 316.780786] __should_failslab+0x121/0x190 [ 316.780843] should_failslab+0x9/0x14 [ 316.780862] __kmalloc+0x2dc/0x740 [ 316.780913] ? drm_ioctl+0x45c/0xa50 20:12:55 executing program 1 (fault-call:2 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 316.780935] drm_ioctl+0x45c/0xa50 [ 316.780970] ? drm_mode_create_dumb+0x310/0x310 [ 316.780997] ? drm_version+0x3d0/0x3d0 20:12:55 executing program 1 (fault-call:2 fault-nth:3): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x57, 0x0, 0x0) [ 316.781034] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 316.781055] ? __lockdep_free_key_range+0x120/0x120 [ 316.781082] ? ___might_sleep+0x163/0x280 20:12:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000002300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, 0x0, 0xfffffffffffffea5}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xda) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x4, 0x8}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002300)=ANY=[], &(0x7f0000000100)=""/4096, 0x14e147, 0x1000, 0x1}, 0x20) [ 316.781107] ? drm_version+0x3d0/0x3d0 [ 316.781169] do_vfs_ioctl+0xd6e/0x1390 [ 316.781196] ? ioctl_preallocate+0x210/0x210 [ 316.781259] ? selinux_file_mprotect+0x620/0x620 [ 316.781288] ? ksys_dup3+0x3e0/0x3e0 [ 316.781337] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.781376] ? tomoyo_file_ioctl+0x23/0x30 [ 316.781396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.781439] ? security_file_ioctl+0x93/0xc0 [ 316.781458] ksys_ioctl+0xab/0xd0 [ 316.781480] __x64_sys_ioctl+0x73/0xb0 [ 316.781502] do_syscall_64+0x103/0x610 [ 316.781527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.781541] RIP: 0033:0x457f29 [ 316.781560] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.781569] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.781585] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 316.781596] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 316.781606] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.781616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 316.781626] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 316.903790] FAULT_INJECTION: forcing a failure. [ 316.903790] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 316.903810] CPU: 1 PID: 12663 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 316.903819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.903825] Call Trace: [ 316.903847] dump_stack+0x172/0x1f0 [ 316.903880] should_fail.cold+0xa/0x15 [ 316.903975] ? debug_smp_processor_id+0x3c/0x280 [ 316.903998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.904014] ? debug_smp_processor_id+0x3c/0x280 [ 316.904036] ? perf_trace_lock+0xeb/0x510 [ 316.904105] should_fail_alloc_page+0x50/0x60 [ 316.904127] __alloc_pages_nodemask+0x1a1/0x7e0 [ 316.904152] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 316.904167] ? find_held_lock+0x35/0x130 [ 316.904196] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.904228] cache_grow_begin+0x9c/0x860 [ 316.904249] ? drm_ioctl+0x45c/0xa50 [ 316.904269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.904291] __kmalloc+0x67f/0x740 [ 316.904312] ? drm_ioctl+0x45c/0xa50 [ 316.904334] drm_ioctl+0x45c/0xa50 [ 316.904350] ? drm_mode_create_dumb+0x310/0x310 [ 316.904388] ? drm_version+0x3d0/0x3d0 [ 316.904406] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 316.904426] ? __lockdep_free_key_range+0x120/0x120 [ 316.904456] ? ___might_sleep+0x163/0x280 [ 316.904480] ? drm_version+0x3d0/0x3d0 [ 316.904502] do_vfs_ioctl+0xd6e/0x1390 [ 316.904525] ? ioctl_preallocate+0x210/0x210 [ 316.904545] ? selinux_file_mprotect+0x620/0x620 [ 316.904572] ? ksys_dup3+0x3e0/0x3e0 [ 316.904592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.904616] ? tomoyo_file_ioctl+0x23/0x30 [ 316.904632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.904648] ? security_file_ioctl+0x93/0xc0 [ 316.904670] ksys_ioctl+0xab/0xd0 20:12:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0x80, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:55 executing program 1 (fault-call:2 fault-nth:4): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f00000000c0)=0x80000) rmdir(&(0x7f0000000100)='.\x00') 20:12:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd!', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x68, 0x0, 0x10001, 0x100000001}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x7, r2}) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) [ 316.904693] __x64_sys_ioctl+0x73/0xb0 [ 316.904715] do_syscall_64+0x103/0x610 [ 316.904741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.904754] RIP: 0033:0x457f29 [ 316.904771] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.904781] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.904798] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 316.904807] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 316.904818] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.904828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 316.904839] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 317.044494] FAULT_INJECTION: forcing a failure. [ 317.044494] name failslab, interval 1, probability 0, space 0, times 0 [ 317.044511] CPU: 0 PID: 12668 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 317.044521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.044526] Call Trace: [ 317.044548] dump_stack+0x172/0x1f0 [ 317.044572] should_fail.cold+0xa/0x15 [ 317.044593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.044617] ? ___might_sleep+0x163/0x280 [ 317.044638] __should_failslab+0x121/0x190 [ 317.044657] should_failslab+0x9/0x14 [ 317.044676] kmem_cache_alloc_trace+0x2d1/0x760 [ 317.044696] ? drm_dev_exit+0x22/0x60 [ 317.044715] ? find_held_lock+0x35/0x130 [ 317.044803] __vgem_gem_create+0x49/0x100 [ 317.044827] vgem_gem_dumb_create+0xd7/0x260 [ 317.044852] drm_mode_create_dumb+0x288/0x310 [ 317.044878] drm_mode_create_dumb_ioctl+0x26/0x30 [ 317.044901] drm_ioctl_kernel+0x23b/0x2e0 [ 317.044917] ? drm_mode_create_dumb+0x310/0x310 [ 317.044936] ? drm_setversion+0x8c0/0x8c0 [ 317.044958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.044975] ? _copy_from_user+0xdd/0x150 [ 317.044996] drm_ioctl+0x545/0xa50 [ 317.045015] ? drm_mode_create_dumb+0x310/0x310 [ 317.045041] ? drm_version+0x3d0/0x3d0 [ 317.045061] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 317.045078] ? __lockdep_free_key_range+0x120/0x120 [ 317.045103] ? ___might_sleep+0x163/0x280 [ 317.045127] ? drm_version+0x3d0/0x3d0 [ 317.045146] do_vfs_ioctl+0xd6e/0x1390 [ 317.045172] ? ioctl_preallocate+0x210/0x210 [ 317.045190] ? selinux_file_mprotect+0x620/0x620 [ 317.045214] ? ksys_dup3+0x3e0/0x3e0 [ 317.045231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.045256] ? tomoyo_file_ioctl+0x23/0x30 [ 317.045274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.045290] ? security_file_ioctl+0x93/0xc0 [ 317.045323] ksys_ioctl+0xab/0xd0 [ 317.045348] __x64_sys_ioctl+0x73/0xb0 [ 317.045388] do_syscall_64+0x103/0x610 [ 317.045420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.045438] RIP: 0033:0x457f29 [ 317.045456] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.045468] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.045491] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 317.045505] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 317.045518] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.045530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 317.045543] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 317.215831] FAULT_INJECTION: forcing a failure. [ 317.215831] name failslab, interval 1, probability 0, space 0, times 0 20:12:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) [ 317.215850] CPU: 0 PID: 12678 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 317.215859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.215864] Call Trace: [ 317.215886] dump_stack+0x172/0x1f0 [ 317.215917] should_fail.cold+0xa/0x15 [ 317.215938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.215960] ? ___might_sleep+0x163/0x280 [ 317.215986] __should_failslab+0x121/0x190 [ 317.216009] ? shmem_destroy_callback+0xc0/0xc0 [ 317.216031] should_failslab+0x9/0x14 [ 317.216052] kmem_cache_alloc+0x2b2/0x6f0 [ 317.216077] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 317.216099] ? shmem_destroy_callback+0xc0/0xc0 [ 317.216119] shmem_alloc_inode+0x1c/0x50 [ 317.216136] alloc_inode+0x66/0x190 [ 317.216155] new_inode_pseudo+0x19/0xf0 [ 317.216174] new_inode+0x1f/0x40 [ 317.216191] shmem_get_inode+0x84/0x780 [ 317.216209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.216237] __shmem_file_setup.part.0+0x7e/0x2b0 [ 317.216262] shmem_file_setup+0x66/0x90 [ 317.216285] drm_gem_object_init+0x3b/0xb0 [ 317.216309] __vgem_gem_create+0x6f/0x100 [ 317.216329] vgem_gem_dumb_create+0xd7/0x260 [ 317.216353] drm_mode_create_dumb+0x288/0x310 [ 317.216399] drm_mode_create_dumb_ioctl+0x26/0x30 [ 317.216419] drm_ioctl_kernel+0x23b/0x2e0 [ 317.216439] ? drm_mode_create_dumb+0x310/0x310 [ 317.216458] ? drm_setversion+0x8c0/0x8c0 [ 317.216482] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.216500] ? _copy_from_user+0xdd/0x150 [ 317.216523] drm_ioctl+0x545/0xa50 [ 317.216541] ? drm_mode_create_dumb+0x310/0x310 [ 317.216566] ? drm_version+0x3d0/0x3d0 [ 317.216585] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 317.216604] ? __lockdep_free_key_range+0x120/0x120 [ 317.216631] ? ___might_sleep+0x163/0x280 [ 317.216658] ? drm_version+0x3d0/0x3d0 [ 317.216682] do_vfs_ioctl+0xd6e/0x1390 [ 317.216706] ? ioctl_preallocate+0x210/0x210 [ 317.216726] ? selinux_file_mprotect+0x620/0x620 [ 317.216752] ? ksys_dup3+0x3e0/0x3e0 [ 317.216771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.216795] ? tomoyo_file_ioctl+0x23/0x30 [ 317.216812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:12:56 executing program 5: timer_create(0x100000000000, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={&(0x7f00000001c0)="1f6580f942018ad8a5318e4be7362a74eec276e00b670ad87abfff05909e7ab3f94c36f3895f20795e47b055fe06e8492ae95a6c17a0fbd3af48fade9f71f8ee6d1d3a5a9ba96a088ddaada6ef388ce5da744e3b05fad0b3991e51c4bfc4eb4f577f4c38534db522e1412f7f6a23f533c49ee16ac5dff5ce3d85a5ad44dd44f08468f8c6a8f59ec29386899ea37eec1fef490768485082e4d2971562240240b43261a8081321ba510099463752e89d581da4e2487c6b9d7be691dbe791b1415cf371b49646420978451dd413d720e5cdbcba8c347ec3", &(0x7f00000002c0)="9e"}}, &(0x7f0000044000)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000001900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0xfffffffffffffe12, &(0x7f0000000300)={&(0x7f0000000280)=@flushpolicy={0x10, 0x1d, 0x705}, 0x87}}, 0x0) listen(r2, 0x8000) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) syz_open_dev$sndseq(0x0, 0x0, 0x28000) sendto$inet6(r1, &(0x7f00000005c0), 0xc005002000003fd6, 0x0, 0x0, 0x0) r4 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) munlockall() ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e23, @broadcast}, 0x200, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x7, 0x6}) tkill(r4, 0x14) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f0000000300)={0x0, 0x1, 0x1}) 20:12:56 executing program 1 (fault-call:2 fault-nth:5): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69649d7d34f942333261944e62a00b32fdcac14bfb13d9293e8876251ef094ecb965cd90b3745f873c1ec5d1281efbd3b8415f3b9d32e979ebd81a3a11de19af", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0xe9cd387253794e8e) [ 317.216828] ? security_file_ioctl+0x93/0xc0 [ 317.216850] ksys_ioctl+0xab/0xd0 [ 317.216872] __x64_sys_ioctl+0x73/0xb0 [ 317.216891] do_syscall_64+0x103/0x610 [ 317.216916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.216929] RIP: 0033:0x457f29 [ 317.216945] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.216955] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.216971] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 317.216982] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 317.216992] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.217002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 317.217011] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 317.619774] FAULT_INJECTION: forcing a failure. [ 317.619774] name failslab, interval 1, probability 0, space 0, times 0 [ 317.667012] CPU: 1 PID: 12686 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 317.682510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.682517] Call Trace: [ 317.682540] dump_stack+0x172/0x1f0 [ 317.682562] should_fail.cold+0xa/0x15 [ 317.682577] ? find_held_lock+0x35/0x130 [ 317.682594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.682615] ? ___might_sleep+0x163/0x280 [ 317.682635] __should_failslab+0x121/0x190 [ 317.682655] should_failslab+0x9/0x14 [ 317.682670] kmem_cache_alloc+0x2b2/0x6f0 20:12:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) [ 317.682744] ? __put_user_ns+0x70/0x70 [ 317.682760] ? shmem_alloc_inode+0x1c/0x50 [ 317.682817] ? rcu_read_lock_sched_held+0x110/0x130 [ 317.682837] security_inode_alloc+0x39/0x160 [ 317.698022] inode_init_always+0x56e/0xb50 [ 317.698042] alloc_inode+0x83/0x190 [ 317.698058] new_inode_pseudo+0x19/0xf0 [ 317.698073] new_inode+0x1f/0x40 [ 317.731286] shmem_get_inode+0x84/0x780 [ 317.731305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.731327] __shmem_file_setup.part.0+0x7e/0x2b0 [ 317.731349] shmem_file_setup+0x66/0x90 [ 317.731382] drm_gem_object_init+0x3b/0xb0 [ 317.731402] __vgem_gem_create+0x6f/0x100 [ 317.731419] vgem_gem_dumb_create+0xd7/0x260 [ 317.731440] drm_mode_create_dumb+0x288/0x310 [ 317.740786] drm_mode_create_dumb_ioctl+0x26/0x30 [ 317.740806] drm_ioctl_kernel+0x23b/0x2e0 [ 317.740821] ? drm_mode_create_dumb+0x310/0x310 [ 317.740838] ? drm_setversion+0x8c0/0x8c0 [ 317.759322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.801946] ? _copy_from_user+0xdd/0x150 [ 317.801968] drm_ioctl+0x545/0xa50 [ 317.801986] ? drm_mode_create_dumb+0x310/0x310 [ 317.810469] ? drm_version+0x3d0/0x3d0 [ 317.810487] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 317.810504] ? __lockdep_free_key_range+0x120/0x120 [ 317.810530] ? ___might_sleep+0x163/0x280 [ 317.876408] ? drm_version+0x3d0/0x3d0 [ 317.876429] do_vfs_ioctl+0xd6e/0x1390 [ 317.876449] ? ioctl_preallocate+0x210/0x210 [ 317.905529] ? selinux_file_mprotect+0x620/0x620 [ 317.905555] ? ksys_dup3+0x3e0/0x3e0 [ 317.905574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.905597] ? tomoyo_file_ioctl+0x23/0x30 [ 317.905612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.905626] ? security_file_ioctl+0x93/0xc0 [ 317.905646] ksys_ioctl+0xab/0xd0 [ 317.905667] __x64_sys_ioctl+0x73/0xb0 [ 317.959777] do_syscall_64+0x103/0x610 [ 317.959802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.959820] RIP: 0033:0x457f29 [ 317.986329] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.986339] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.986355] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 317.986376] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 317.986385] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.986394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 317.986407] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 318.250801] FAULT_INJECTION: forcing a failure. [ 318.250801] name failslab, interval 1, probability 0, space 0, times 0 [ 318.379947] CPU: 0 PID: 12712 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 318.547137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.547144] Call Trace: [ 318.547168] dump_stack+0x172/0x1f0 [ 318.547191] should_fail.cold+0xa/0x15 [ 318.547210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.547231] ? ___might_sleep+0x163/0x280 [ 318.547251] __should_failslab+0x121/0x190 [ 318.547270] should_failslab+0x9/0x14 [ 318.547285] kmem_cache_alloc+0x2b2/0x6f0 [ 318.547297] ? current_time+0x6b/0x140 [ 318.547311] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 318.547326] ? lockdep_hardirqs_on+0x418/0x5d0 [ 318.547341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.547353] ? timespec64_trunc+0xf0/0x180 [ 318.547389] __d_alloc+0x2e/0x8c0 [ 318.547410] d_alloc_pseudo+0x1e/0x30 [ 318.547480] alloc_file_pseudo+0xe2/0x280 [ 318.547500] ? alloc_file+0x4d0/0x4d0 [ 318.547517] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 318.547545] __shmem_file_setup.part.0+0x108/0x2b0 [ 318.547566] shmem_file_setup+0x66/0x90 [ 318.547584] drm_gem_object_init+0x3b/0xb0 [ 318.547603] __vgem_gem_create+0x6f/0x100 [ 318.547619] vgem_gem_dumb_create+0xd7/0x260 [ 318.547640] drm_mode_create_dumb+0x288/0x310 [ 318.547660] drm_mode_create_dumb_ioctl+0x26/0x30 [ 318.547677] drm_ioctl_kernel+0x23b/0x2e0 [ 318.547691] ? drm_mode_create_dumb+0x310/0x310 [ 318.547706] ? drm_setversion+0x8c0/0x8c0 [ 318.547724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.547737] ? _copy_from_user+0xdd/0x150 [ 318.547756] drm_ioctl+0x545/0xa50 [ 318.547769] ? drm_mode_create_dumb+0x310/0x310 [ 318.547791] ? drm_version+0x3d0/0x3d0 [ 318.547805] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 318.547820] ? __lockdep_free_key_range+0x120/0x120 [ 318.547844] ? ___might_sleep+0x163/0x280 [ 318.547866] ? drm_version+0x3d0/0x3d0 [ 318.547883] do_vfs_ioctl+0xd6e/0x1390 [ 318.547903] ? ioctl_preallocate+0x210/0x210 [ 318.547918] ? selinux_file_mprotect+0x620/0x620 [ 318.547941] ? ksys_dup3+0x3e0/0x3e0 [ 318.547957] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.547977] ? tomoyo_file_ioctl+0x23/0x30 [ 318.547991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.548005] ? security_file_ioctl+0x93/0xc0 [ 318.548023] ksys_ioctl+0xab/0xd0 [ 318.548042] __x64_sys_ioctl+0x73/0xb0 [ 318.548060] do_syscall_64+0x103/0x610 [ 318.548082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.548094] RIP: 0033:0x457f29 [ 318.548110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.548118] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.548132] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 318.548142] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 318.548150] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.548159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 318.548168] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 20:12:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 20:12:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="33213ab98b2bc955392c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d1b5c54732ba5cb6e1179c09662ddf79e506a2dbf82094a7510ec589e2d77ed504bdc9a70ac5be69fc904c36dc9e1266503a061cfeefaad4ebe495f2f5833925c842b2706b0687f5957f612747cd5f46d20c4128f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:12:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x223) 20:12:58 executing program 1 (fault-call:2 fault-nth:6): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x4, @u64}]}, 0x20}}, 0x0) r1 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x101403, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r3, r4}}, 0x18) keyctl$invalidate(0x15, r1) 20:12:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) [ 320.153643] FAULT_INJECTION: forcing a failure. [ 320.153643] name failslab, interval 1, probability 0, space 0, times 0 [ 320.182214] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 20:12:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x400, 0x4d2, 0x9, 0x3}, {0x0, 0x9, 0x91, 0x7f}, {0x0, 0x10000, 0x5bf5, 0x1ff}, {0x7, 0x7fffffff, 0xffffffff, 0x100000001}, {0x0, 0xfffffffffffffffc, 0x24, 0x9}, {0x7, 0x4, 0x4, 0x80000000}, {0x81, 0x6, 0x8, 0x5}, {0x2, 0x8, 0x0, 0xe681}, {0xd9, 0xefa7, 0x7, 0x1}]}, 0x10) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xffffffffffffffa6, 0xfffffff5, 0x3}, 0x10) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f00000005c0)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xee00, 0xee00, 0xee00]) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r2}], {0x4, 0x2}, [{0x8, 0x0, r3}, {0x8, 0x4, r4}, {0x8, 0x7, r5}, {0x8, 0x3, r6}], {0x10, 0x6}}, 0x4c, 0x3) read(r0, 0x0, 0x0) [ 320.241233] CPU: 1 PID: 12733 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 320.248216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.257585] Call Trace: [ 320.260193] dump_stack+0x172/0x1f0 [ 320.263848] should_fail.cold+0xa/0x15 [ 320.267764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.272900] ? ___might_sleep+0x163/0x280 [ 320.277074] __should_failslab+0x121/0x190 [ 320.277097] should_failslab+0x9/0x14 [ 320.277114] kmem_cache_alloc+0x2b2/0x6f0 [ 320.277127] ? current_time+0x6b/0x140 [ 320.277146] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 320.285189] ? lockdep_hardirqs_on+0x418/0x5d0 [ 320.285206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.285221] ? timespec64_trunc+0xf0/0x180 [ 320.285242] __d_alloc+0x2e/0x8c0 [ 320.285263] d_alloc_pseudo+0x1e/0x30 [ 320.293297] alloc_file_pseudo+0xe2/0x280 [ 320.293319] ? alloc_file+0x4d0/0x4d0 [ 320.293338] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 320.293377] __shmem_file_setup.part.0+0x108/0x2b0 [ 320.293404] shmem_file_setup+0x66/0x90 [ 320.305023] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 320.308657] drm_gem_object_init+0x3b/0xb0 [ 320.308680] __vgem_gem_create+0x6f/0x100 [ 320.308698] vgem_gem_dumb_create+0xd7/0x260 [ 320.308723] drm_mode_create_dumb+0x288/0x310 [ 320.320227] drm_mode_create_dumb_ioctl+0x26/0x30 [ 320.328254] drm_ioctl_kernel+0x23b/0x2e0 [ 320.328274] ? drm_mode_create_dumb+0x310/0x310 [ 320.328291] ? drm_setversion+0x8c0/0x8c0 [ 320.328312] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.328329] ? _copy_from_user+0xdd/0x150 [ 320.394962] drm_ioctl+0x545/0xa50 [ 320.398524] ? drm_mode_create_dumb+0x310/0x310 [ 320.403224] ? drm_version+0x3d0/0x3d0 [ 320.407129] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 320.412245] ? __lockdep_free_key_range+0x120/0x120 [ 320.417289] ? ___might_sleep+0x163/0x280 [ 320.421467] ? drm_version+0x3d0/0x3d0 [ 320.425382] do_vfs_ioctl+0xd6e/0x1390 [ 320.429313] ? ioctl_preallocate+0x210/0x210 [ 320.433744] ? selinux_file_mprotect+0x620/0x620 [ 320.438526] ? ksys_dup3+0x3e0/0x3e0 [ 320.442261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.447829] ? tomoyo_file_ioctl+0x23/0x30 [ 320.452090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.457654] ? security_file_ioctl+0x93/0xc0 [ 320.463997] ksys_ioctl+0xab/0xd0 [ 320.467560] __x64_sys_ioctl+0x73/0xb0 [ 320.471469] do_syscall_64+0x103/0x610 [ 320.475388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.480594] RIP: 0033:0x457f29 [ 320.484077] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.503000] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.510727] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 320.518017] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 320.525304] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 320.532589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 320.539881] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 20:12:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x400000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="441ef1b1bd5dd71ed55f34654d73906e0882fd2772474a789e4664828698f2f54666caafc779823bf12cc581898fc44f4a16a468c31ffa457a7f428587644e8b653b7d8e9f79829f369da0c5b0384709caa37e0768a3a606abec95b7e5f7c16c46793ebb86f2ec2ca866989c5021561b0247f189352bd43eb86c914cb3ee5e83de64c09f08c84bfe28694c83e7dfb91c24725032a1c8e3dfad63114f39444b38163dd42534e7b886460b099bfa8183db05cf75ec2ce17e7e8bf548c8633392306133d4b6add9ac4172016de53bdd40a7b40d7c8b0c535da7bf99610734fc9e21a2318ff7c1d7326fbbaf7695f232"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 20:12:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 20:12:58 executing program 1 (fault-call:2 fault-nth:7): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 320.736483] FAULT_INJECTION: forcing a failure. [ 320.736483] name failslab, interval 1, probability 0, space 0, times 0 [ 320.748430] CPU: 1 PID: 12762 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 320.755399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.764767] Call Trace: [ 320.767391] dump_stack+0x172/0x1f0 [ 320.771045] should_fail.cold+0xa/0x15 [ 320.774966] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.780097] ? ___might_sleep+0x163/0x280 [ 320.784267] __should_failslab+0x121/0x190 [ 320.788525] should_failslab+0x9/0x14 [ 320.792342] kmem_cache_alloc+0x2b2/0x6f0 [ 320.796523] __alloc_file+0x27/0x300 [ 320.800258] alloc_empty_file+0x72/0x170 [ 320.804338] alloc_file+0x5e/0x4d0 [ 320.807912] alloc_file_pseudo+0x189/0x280 [ 320.812162] ? alloc_file+0x4d0/0x4d0 [ 320.815981] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 320.821547] __shmem_file_setup.part.0+0x108/0x2b0 [ 320.826504] shmem_file_setup+0x66/0x90 [ 320.830499] drm_gem_object_init+0x3b/0xb0 [ 320.834756] __vgem_gem_create+0x6f/0x100 [ 320.838926] vgem_gem_dumb_create+0xd7/0x260 [ 320.843352] drm_mode_create_dumb+0x288/0x310 [ 320.847895] drm_mode_create_dumb_ioctl+0x26/0x30 [ 320.852756] drm_ioctl_kernel+0x23b/0x2e0 [ 320.856922] ? drm_mode_create_dumb+0x310/0x310 [ 320.861607] ? drm_setversion+0x8c0/0x8c0 [ 320.865772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.871324] ? _copy_from_user+0xdd/0x150 [ 320.875503] drm_ioctl+0x545/0xa50 [ 320.879055] ? drm_mode_create_dumb+0x310/0x310 [ 320.883748] ? drm_version+0x3d0/0x3d0 [ 320.887648] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 320.892772] ? __lockdep_free_key_range+0x120/0x120 [ 320.897818] ? ___might_sleep+0x163/0x280 [ 320.901994] ? drm_version+0x3d0/0x3d0 [ 320.905905] do_vfs_ioctl+0xd6e/0x1390 [ 320.909815] ? ioctl_preallocate+0x210/0x210 [ 320.914236] ? selinux_file_mprotect+0x620/0x620 [ 320.919014] ? ksys_dup3+0x3e0/0x3e0 [ 320.922754] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.928300] ? tomoyo_file_ioctl+0x23/0x30 [ 320.932524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.938058] ? security_file_ioctl+0x93/0xc0 [ 320.942457] ksys_ioctl+0xab/0xd0 [ 320.945909] __x64_sys_ioctl+0x73/0xb0 [ 320.949789] do_syscall_64+0x103/0x610 [ 320.953675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.958852] RIP: 0033:0x457f29 [ 320.962036] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:12:59 executing program 5: r0 = getpid() r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000001c0)=0x800) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x80) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000200)) close(r1) r3 = msgget(0x3, 0x2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getegid() msgctl$IPC_SET(r3, 0x1, &(0x7f0000000cc0)={{0x7, r4, r6, r7, r5, 0x81, 0x3f}, 0x9, 0x20, 0xd6, 0x8aa, 0x4, 0x4, r0, r0}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x3f, 0x20, 0x3, 0xffff}, &(0x7f0000000180)=0x18) write$vhci(r2, &(0x7f0000000dc0)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000a40)={@null=' \x00', 0x3, 'vlan0\x00'}) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000b40)=@assoc_value={r8, 0x7fffffff}, 0xfffffffffffffc9f) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000d40)=0x5) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x6) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x14, 0x4, 0x1000000000000001, 0x80000009}, 0x24) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000d80)={0x3, 0x20, [0x3, 0x8, 0x2, 0x0, 0xe54, 0x0, 0x3f, 0x4]}) [ 320.980932] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.988641] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 320.995919] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 321.003207] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 321.010591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 321.017881] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 20:12:59 executing program 1 (fault-call:2 fault-nth:8): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:12:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) 20:12:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x223) 20:12:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) [ 321.210059] FAULT_INJECTION: forcing a failure. [ 321.210059] name failslab, interval 1, probability 0, space 0, times 0 [ 321.221728] CPU: 1 PID: 12776 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 321.228679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.238052] Call Trace: [ 321.240663] dump_stack+0x172/0x1f0 [ 321.244319] should_fail.cold+0xa/0x15 [ 321.248240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.253373] ? find_held_lock+0x35/0x130 [ 321.257459] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 321.262397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.267925] ? should_fail+0x1de/0x852 [ 321.271805] __should_failslab+0x121/0x190 [ 321.276031] should_failslab+0x9/0x14 [ 321.279844] kmem_cache_alloc+0x47/0x6f0 [ 321.283951] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 321.289568] idr_get_free+0x425/0x8d0 [ 321.293393] idr_alloc_u32+0x19e/0x330 [ 321.297306] ? __fprop_inc_percpu_max+0x230/0x230 [ 321.302169] ? drm_gem_handle_create+0x47/0x70 [ 321.306836] idr_alloc+0xe5/0x150 [ 321.310312] ? idr_alloc_u32+0x330/0x330 [ 321.314408] drm_gem_handle_create_tail+0x12a/0x3b0 [ 321.319449] drm_gem_handle_create+0x55/0x70 [ 321.323886] vgem_gem_dumb_create+0x10a/0x260 [ 321.328412] drm_mode_create_dumb+0x288/0x310 [ 321.332930] drm_mode_create_dumb_ioctl+0x26/0x30 [ 321.337792] drm_ioctl_kernel+0x23b/0x2e0 [ 321.341956] ? drm_mode_create_dumb+0x310/0x310 [ 321.346730] ? drm_setversion+0x8c0/0x8c0 [ 321.350900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 321.356453] ? _copy_from_user+0xdd/0x150 20:12:59 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x840, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r2, 0x2}, &(0x7f0000000200)=0x8) signalfd4(r0, &(0x7f0000000380)={0x6}, 0x8, 0x80000) syz_emit_ethernet(0xe, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000e680000000000000005bf411f8f246fb3ce4abe242715d6ce7d996fb874c7d783b16e4eaa44c1bbdb663205c1c840f056431ff1e19647deb25bc8d4b8dc0"], 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x10, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x10, 0x0, @udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x24040001}, 0x20000000) [ 321.360621] drm_ioctl+0x545/0xa50 [ 321.364184] ? drm_mode_create_dumb+0x310/0x310 [ 321.368879] ? drm_version+0x3d0/0x3d0 [ 321.372783] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 321.377905] ? __lockdep_free_key_range+0x120/0x120 [ 321.382939] ? ___might_sleep+0x163/0x280 [ 321.382980] ? drm_version+0x3d0/0x3d0 [ 321.382999] do_vfs_ioctl+0xd6e/0x1390 [ 321.383022] ? ioctl_preallocate+0x210/0x210 [ 321.399343] ? selinux_file_mprotect+0x620/0x620 [ 321.404127] ? ksys_dup3+0x3e0/0x3e0 [ 321.407857] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 321.413425] ? tomoyo_file_ioctl+0x23/0x30 [ 321.417670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.417687] ? security_file_ioctl+0x93/0xc0 [ 321.417708] ksys_ioctl+0xab/0xd0 [ 321.417728] __x64_sys_ioctl+0x73/0xb0 [ 321.417747] do_syscall_64+0x103/0x610 [ 321.438917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.444125] RIP: 0033:0x457f29 20:12:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='syscall\x00') ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f00000000c0)={0xf, {0x40000000000, 0x4, 0x7c, 0x6}, {0x5, 0x10001, 0x2, 0x7}, {0x9, 0xe79}}) [ 321.447336] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.466268] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.474012] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 321.481298] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 321.488583] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 321.495881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 321.503167] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 20:12:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x223) 20:13:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x1000000000009}, 0x2c) 20:13:00 executing program 1 (fault-call:2 fault-nth:9): r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 20:13:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030d683ce3030303030301030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet6_dccp_int(r1, 0x21, 0x9, &(0x7f00000000c0), &(0x7f0000000240)=0x1039d) 20:13:00 executing program 2 (fault-call:10 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 321.820398] FAULT_INJECTION: forcing a failure. [ 321.820398] name failslab, interval 1, probability 0, space 0, times 0 [ 321.851102] CPU: 0 PID: 12802 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 321.858084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.867453] Call Trace: [ 321.870063] dump_stack+0x172/0x1f0 [ 321.873718] should_fail.cold+0xa/0x15 [ 321.877632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.882761] ? ___might_sleep+0x163/0x280 [ 321.886927] __should_failslab+0x121/0x190 [ 321.891180] should_failslab+0x9/0x14 [ 321.895001] kmem_cache_alloc_trace+0x2d1/0x760 [ 321.899690] ? wait_for_completion+0x440/0x440 [ 321.904352] drm_vma_node_allow+0x52/0x2f0 [ 321.908633] drm_gem_handle_create_tail+0x194/0x3b0 [ 321.913678] drm_gem_handle_create+0x55/0x70 [ 321.918102] vgem_gem_dumb_create+0x10a/0x260 [ 321.922612] drm_mode_create_dumb+0x288/0x310 [ 321.922634] drm_mode_create_dumb_ioctl+0x26/0x30 [ 321.922651] drm_ioctl_kernel+0x23b/0x2e0 [ 321.922666] ? drm_mode_create_dumb+0x310/0x310 [ 321.922684] ? drm_setversion+0x8c0/0x8c0 [ 321.945014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 321.950569] ? _copy_from_user+0xdd/0x150 [ 321.954741] drm_ioctl+0x545/0xa50 [ 321.958300] ? drm_mode_create_dumb+0x310/0x310 [ 321.962992] ? drm_version+0x3d0/0x3d0 [ 321.966893] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 321.972009] ? __lockdep_free_key_range+0x120/0x120 [ 321.977052] ? ___might_sleep+0x163/0x280 [ 321.981219] ? drm_version+0x3d0/0x3d0 [ 321.985127] do_vfs_ioctl+0xd6e/0x1390 [ 321.989032] ? ioctl_preallocate+0x210/0x210 [ 321.993455] ? selinux_file_mprotect+0x620/0x620 [ 321.998235] ? ksys_dup3+0x3e0/0x3e0 [ 322.001964] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.007521] ? tomoyo_file_ioctl+0x23/0x30 [ 322.011780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.017332] ? security_file_ioctl+0x93/0xc0 [ 322.021772] ksys_ioctl+0xab/0xd0 [ 322.025241] __x64_sys_ioctl+0x73/0xb0 [ 322.029147] do_syscall_64+0x103/0x610 [ 322.033057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.038256] RIP: 0033:0x457f29 [ 322.041457] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.060377] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:13:00 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x1, 0x0, 0x0, &(0x7f0000000980)=""/118, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x0, 0x1, 0x0, &(0x7f0000000400)=""/156, 0x0}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x60200, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x2000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)={r2, r3}) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x210000) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000080)=""/140) [ 322.068099] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 322.075384] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 322.082655] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 322.089928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 322.097207] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 322.135433] ================================================================== [ 322.143136] BUG: KASAN: use-after-free in drm_gem_object_release+0xf1/0x110 [ 322.150255] Read of size 8 at addr ffff888098767bd0 by task syz-executor.1/12802 [ 322.157909] [ 322.159553] CPU: 1 PID: 12802 Comm: syz-executor.1 Not tainted 5.0.0+ #12 [ 322.166487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.175881] Call Trace: [ 322.178489] dump_stack+0x172/0x1f0 [ 322.182135] ? drm_gem_object_release+0xf1/0x110 [ 322.186921] print_address_description.cold+0x7c/0x20d [ 322.192223] ? drm_gem_object_release+0xf1/0x110 [ 322.196997] ? drm_gem_object_release+0xf1/0x110 [ 322.201772] kasan_report.cold+0x1b/0x40 [ 322.205852] ? vgem_gem_free_object+0xb0/0xe0 [ 322.210400] ? drm_gem_object_release+0xf1/0x110 [ 322.215176] __asan_report_load8_noabort+0x14/0x20 [ 322.220127] drm_gem_object_release+0xf1/0x110 [ 322.224726] vgem_gem_dumb_create+0x205/0x260 [ 322.229243] drm_mode_create_dumb+0x288/0x310 [ 322.233763] drm_mode_create_dumb_ioctl+0x26/0x30 [ 322.238620] drm_ioctl_kernel+0x23b/0x2e0 [ 322.242784] ? drm_mode_create_dumb+0x310/0x310 [ 322.247472] ? drm_setversion+0x8c0/0x8c0 [ 322.251638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.257193] ? _copy_from_user+0xdd/0x150 [ 322.261372] drm_ioctl+0x545/0xa50 [ 322.264929] ? drm_mode_create_dumb+0x310/0x310 [ 322.269625] ? drm_version+0x3d0/0x3d0 [ 322.273527] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 322.278644] ? __lockdep_free_key_range+0x120/0x120 [ 322.283672] ? ___might_sleep+0x163/0x280 [ 322.287834] ? drm_version+0x3d0/0x3d0 [ 322.291730] do_vfs_ioctl+0xd6e/0x1390 [ 322.295627] ? ioctl_preallocate+0x210/0x210 [ 322.300040] ? selinux_file_mprotect+0x620/0x620 [ 322.304805] ? ksys_dup3+0x3e0/0x3e0 [ 322.308524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.314068] ? tomoyo_file_ioctl+0x23/0x30 [ 322.318308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.323848] ? security_file_ioctl+0x93/0xc0 [ 322.328267] ksys_ioctl+0xab/0xd0 [ 322.331727] __x64_sys_ioctl+0x73/0xb0 [ 322.335621] do_syscall_64+0x103/0x610 [ 322.339518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.344713] RIP: 0033:0x457f29 [ 322.347913] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.366821] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.374536] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 322.381813] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 322.389168] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 322.396439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 322.403707] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 322.410994] [ 322.412622] Allocated by task 12802: [ 322.416374] save_stack+0x45/0xd0 [ 322.419832] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 322.424779] kasan_kmalloc+0x9/0x10 [ 322.428407] kmem_cache_alloc_trace+0x151/0x760 [ 322.433076] __vgem_gem_create+0x49/0x100 [ 322.437226] vgem_gem_dumb_create+0xd7/0x260 [ 322.441641] drm_mode_create_dumb+0x288/0x310 [ 322.446141] drm_mode_create_dumb_ioctl+0x26/0x30 [ 322.450987] drm_ioctl_kernel+0x23b/0x2e0 [ 322.455139] drm_ioctl+0x545/0xa50 [ 322.458683] do_vfs_ioctl+0xd6e/0x1390 [ 322.463703] ksys_ioctl+0xab/0xd0 [ 322.467157] __x64_sys_ioctl+0x73/0xb0 [ 322.471048] do_syscall_64+0x103/0x610 [ 322.474949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.480136] [ 322.482123] Freed by task 12802: [ 322.485493] save_stack+0x45/0xd0 [ 322.488946] __kasan_slab_free+0x102/0x150 [ 322.493183] kasan_slab_free+0xe/0x10 [ 322.496980] kfree+0xcf/0x230 [ 322.500086] vgem_gem_free_object+0xbe/0xe0 [ 322.504409] drm_gem_object_free+0x108/0x260 [ 322.508821] drm_gem_object_put_unlocked+0x129/0x170 [ 322.513925] vgem_gem_dumb_create+0x115/0x260 [ 322.518423] drm_mode_create_dumb+0x288/0x310 [ 322.522919] drm_mode_create_dumb_ioctl+0x26/0x30 [ 322.527760] drm_ioctl_kernel+0x23b/0x2e0 [ 322.531911] drm_ioctl+0x545/0xa50 [ 322.535452] do_vfs_ioctl+0xd6e/0x1390 [ 322.539337] ksys_ioctl+0xab/0xd0 [ 322.542801] __x64_sys_ioctl+0x73/0xb0 [ 322.546689] do_syscall_64+0x103/0x610 [ 322.550580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.555760] [ 322.557392] The buggy address belongs to the object at ffff888098767ac0 [ 322.557392] which belongs to the cache kmalloc-512 of size 512 [ 322.570057] The buggy address is located 272 bytes inside of [ 322.570057] 512-byte region [ffff888098767ac0, ffff888098767cc0) [ 322.581932] The buggy address belongs to the page: [ 322.587167] page:ffffea000261d9c0 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0x0 [ 322.595816] flags: 0x1fffc0000000200(slab) [ 322.600055] raw: 01fffc0000000200 ffffea00023bea08 ffffea000250a388 ffff88812c3f0940 [ 322.607970] raw: 0000000000000000 ffff8880987670c0 0000000100000006 0000000000000000 [ 322.615848] page dumped because: kasan: bad access detected [ 322.621556] [ 322.623174] Memory state around the buggy address: [ 322.628101] ffff888098767a80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb 20:13:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0301"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000340)={r2}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)="8499c2e7ebf206bdeb06", 0xa) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x0, @local, 0x4e20, 0x3, 'fo\x00', 0x20, 0x6, 0x6a}, 0x2c) read(r0, 0x0, 0x0) 20:13:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)={0x2, {{0x2, 0x4e21, @empty}}, 0x1, 0x7, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @rand_addr=0x9}}, {{0x2, 0x4e24, @empty}}]}, 0x410) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000780)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x30003, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000006c0)={0x7f}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdc\xa7G\xd1\x00', 0xffffff4f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00000004c0)="04000000000000005b71", 0xa) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept(r2, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xb}, 0x8000}, {0xa, 0x4e20, 0x3, @empty, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7260, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x4e23, 0x80000001, 0x4e22, 0xfffffffffffffffe, 0xa, 0xa0, 0xa0, 0x8000bf, 0x0, r5}, {0x0, 0x0, 0x0, 0x0, 0x2, 0xea6}, {0x100000000, 0x0, 0x8}, 0x1000000000000000, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d6, 0x32}, 0xa, @in, 0x0, 0x3, 0x3, 0xfffe00000, 0x8, 0x2, 0x9}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYBLOB="2c000000037e7ac4cd8e1771cbe857b488f137ea77000062e417010409000000784e96254e1b17bcce29ac99ee5937cc0e1b631fbaceca4f93eb34049fa1fa04a7caea418751c715930fc07cd1cf550833ac1546a4aea1749bb3025ae8ba953eff4ed7d7cdaf7d5feea7274857749332994945b138bd739606075643e91f748bc9329e1b98ec3e062bd8af63a5b6517d0d1d3b767dba1c668e6b3fed7c013200d3cc2724dad3089632d9eb"], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x1, 0x0, 0xd135, 0x0, 0x3}, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000009) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f0000000500)="bf", 0x121}], 0x1}, 0x3}], 0x1, 0x0) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[@ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x54}, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000000c0)=0x44) [ 322.635485] ffff888098767b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 322.642848] >ffff888098767b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 322.650209] ^ [ 322.656194] ffff888098767c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 322.663582] ffff888098767c80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 322.670941] ================================================================== [ 322.678306] Disabling lock debugging due to kernel taint 20:13:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) read(r0, 0x0, 0x223) 20:13:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@dont_hash='dont_hash'}]}}) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:13:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0301"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000340)={r2}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)="8499c2e7ebf206bdeb06", 0xa) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x0, @local, 0x4e20, 0x3, 'fo\x00', 0x20, 0x6, 0x6a}, 0x2c) read(r0, 0x0, 0x0) 20:13:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2000, 0x0) write$UHID_CREATE(r1, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000000c0)=""/4, 0x4, 0x8, 0x2, 0x80000000, 0x7ff}, 0x120) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) read(r0, 0x0, 0x0) 20:13:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0301"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000340)={r2}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)="8499c2e7ebf206bdeb06", 0xa) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x0, @local, 0x4e20, 0x3, 'fo\x00', 0x20, 0x6, 0x6a}, 0x2c) read(r0, 0x0, 0x0) [ 322.836736] Kernel panic - not syncing: panic_on_warn set ... [ 322.842689] CPU: 1 PID: 12802 Comm: syz-executor.1 Tainted: G B 5.0.0+ #12 [ 322.851013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.860383] Call Trace: [ 322.862990] dump_stack+0x172/0x1f0 [ 322.866715] panic+0x2cb/0x65c [ 322.869922] ? __warn_printk+0xf3/0xf3 [ 322.873824] ? drm_gem_object_release+0xf1/0x110 [ 322.878595] ? preempt_schedule+0x4b/0x60 [ 322.882761] ? ___preempt_schedule+0x16/0x18 20:13:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0301"]) pread64(r0, &(0x7f00000001c0)=""/84, 0x54, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x6, 0x2000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000340)={r2}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0xfffffff5, 0x3}, 0x10) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)="8499c2e7ebf206bdeb06", 0xa) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000000c0)={0x0, @local, 0x4e20, 0x3, 'fo\x00', 0x20, 0x6, 0x6a}, 0x2c) read(r0, 0x0, 0x0) [ 322.887228] ? trace_hardirqs_on+0x5e/0x230 [ 322.891568] ? drm_gem_object_release+0xf1/0x110 [ 322.896340] end_report+0x47/0x4f [ 322.899803] ? drm_gem_object_release+0xf1/0x110 [ 322.904564] kasan_report.cold+0xe/0x40 [ 322.908554] ? vgem_gem_free_object+0xb0/0xe0 [ 322.913061] ? drm_gem_object_release+0xf1/0x110 [ 322.917835] __asan_report_load8_noabort+0x14/0x20 [ 322.922791] drm_gem_object_release+0xf1/0x110 [ 322.927399] vgem_gem_dumb_create+0x205/0x260 [ 322.931917] drm_mode_create_dumb+0x288/0x310 [ 322.936433] drm_mode_create_dumb_ioctl+0x26/0x30 [ 322.941287] drm_ioctl_kernel+0x23b/0x2e0 [ 322.945456] ? drm_mode_create_dumb+0x310/0x310 [ 322.950151] ? drm_setversion+0x8c0/0x8c0 [ 322.954309] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.959842] ? _copy_from_user+0xdd/0x150 [ 322.963985] drm_ioctl+0x545/0xa50 [ 322.967530] ? drm_mode_create_dumb+0x310/0x310 [ 322.972190] ? drm_version+0x3d0/0x3d0 [ 322.976064] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 322.981190] ? __lockdep_free_key_range+0x120/0x120 [ 322.986217] ? ___might_sleep+0x163/0x280 [ 322.990369] ? drm_version+0x3d0/0x3d0 [ 322.994254] do_vfs_ioctl+0xd6e/0x1390 [ 322.998134] ? ioctl_preallocate+0x210/0x210 [ 323.002531] ? selinux_file_mprotect+0x620/0x620 [ 323.007277] ? ksys_dup3+0x3e0/0x3e0 [ 323.010993] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 323.016544] ? tomoyo_file_ioctl+0x23/0x30 [ 323.020768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.026292] ? security_file_ioctl+0x93/0xc0 [ 323.028590] kobject: 'loop4' (0000000048df58d1): kobject_uevent_env [ 323.030698] ksys_ioctl+0xab/0xd0 [ 323.030716] __x64_sys_ioctl+0x73/0xb0 [ 323.030735] do_syscall_64+0x103/0x610 [ 323.030755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.037368] kobject: 'loop4' (0000000048df58d1): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 323.040616] RIP: 0033:0x457f29 [ 323.040632] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.040640] RSP: 002b:00007f6d31064c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.040654] RAX: ffffffffffffffda RBX: 00007f6d31064c90 RCX: 0000000000457f29 [ 323.040663] RDX: 0000000020000040 RSI: ffffffffffffffb2 RDI: 0000000000000003 [ 323.040676] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 323.045204] kobject: 'loop5' (00000000732aa2d1): kobject_uevent_env [ 323.048436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d310656d4 [ 323.048445] R13: 00000000004bf139 R14: 00000000004d0ac8 R15: 0000000000000004 [ 323.049210] Kernel Offset: disabled [ 323.139779] Rebooting in 86400 seconds..