[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.948713] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 17.689394] random: sshd: uninitialized urandom read (32 bytes read) [ 18.062645] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.709465] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.14' (ECDSA) to the list of known hosts. [ 24.272657] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/29 09:05:57 fuzzer started [ 25.585839] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/29 09:06:00 dialing manager at 10.128.0.26:36683 2018/08/29 09:06:05 syscalls: 1 2018/08/29 09:06:05 code coverage: enabled 2018/08/29 09:06:05 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/08/29 09:06:05 setuid sandbox: enabled 2018/08/29 09:06:05 namespace sandbox: enabled 2018/08/29 09:06:05 fault injection: CONFIG_FAULT_INJECTION is not enabled 2018/08/29 09:06:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/08/29 09:06:05 net packed injection: enabled 2018/08/29 09:06:05 net device setup: enabled [ 34.093382] random: crng init done 09:07:28 executing program 0: 09:07:28 executing program 1: 09:07:28 executing program 7: 09:07:28 executing program 2: 09:07:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x7ff}) 09:07:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000580)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r1, &(0x7f0000002140)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000980)=""/150, 0x96}, {&(0x7f0000000a40)}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, &(0x7f0000002100)=""/28, 0x1c}, 0x0) 09:07:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 09:07:28 executing program 6: ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x400, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) dup2(r2, r0) [ 115.688460] IPVS: Creating netns size=2536 id=1 [ 115.761119] IPVS: Creating netns size=2536 id=2 [ 115.819115] IPVS: Creating netns size=2536 id=3 [ 115.854306] IPVS: Creating netns size=2536 id=4 [ 115.907373] IPVS: Creating netns size=2536 id=5 [ 115.982308] IPVS: Creating netns size=2536 id=6 [ 116.035202] IPVS: Creating netns size=2536 id=7 [ 116.097816] IPVS: Creating netns size=2536 id=8 [ 116.629950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.674162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.687254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 116.695423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.718869] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 116.765839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 116.878372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.954296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 116.965273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 117.010919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 117.052938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.084704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.153100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.167022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.176182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 117.190305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.210309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 117.252062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready INIT: Id "2" respawnin[ 117.275841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready g too fast: disabled for 5 minutes [ 117.291282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 117.315084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready INIT: Id "1" respawnin[ 117.326936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready g too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes [ 117.414320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.424483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.441243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 117.517793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 117.533100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.601082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.609533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.618122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.631753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.649758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.675829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 117.683906] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.698167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.706179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.714251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.729610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 117.738511] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 117.746413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.761718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 117.773103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.784357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.794866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.802598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.810925] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 117.819099] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.827176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 117.838140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.845641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.859209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.866999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.882989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 117.906792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.914331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 117.929973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.941225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.953311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 117.962826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 117.971320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 117.988773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.998669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.018464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 118.030475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 118.042122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.057434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.064945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.084745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.092669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.101960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.115025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.126882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.184848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.219368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.260172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 118.284659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 118.309145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 118.317742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.325234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.343711] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 118.353594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.366655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.379376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.403488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.422463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.430595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.438503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.445901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.462277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 118.509682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 118.607015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 118.613964] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.626700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.684489] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 118.701634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.715308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.127305] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.151909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.322688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.337885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.349279] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.358086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.369808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.385233] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.397614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.404318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.481178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.525806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.551007] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.565258] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.574075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.582254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.598734] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.613317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.626986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.736685] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.745618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.752765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.770150] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.782138] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 122.790290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.798554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.817827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.824993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.975464] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.229234] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.239075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.245787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:07:37 executing program 7: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000810079616d300000000000000000000000006263736630000000000000000000000069706464703000000000000000000000736974300000000000000000000000000180c2000000000000000000aaaaaaaaaabb0000000000000000e000000068010000a001000074696d650000000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000616e000000000000000000000000000000000000000000000000000000000800000000000000feff0000000001006d61726b000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000004c450000000000000000000000000000000000280000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x2a8) 09:07:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") setpriority(0x0, 0x0, 0xffe) r1 = mq_open(&(0x7f00000000c0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000664fc0)) mq_timedreceive(r1, &(0x7f0000000100)=""/23, 0x17, 0x0, 0x0) mq_timedreceive(r1, &(0x7f00000001c0)=""/166, 0xa6, 0x0, &(0x7f00000002c0)={0x77359400}) mq_timedreceive(r1, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 09:07:37 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 09:07:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) 09:07:37 executing program 7: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040), 0x4) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x99b3) 09:07:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000001000120008000100677265000400020008002500000000c39cd26bb8d68688523371257841dced12c0f47765b2eaa570b1ac"], 0x1}}, 0x0) 09:07:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0605345, &(0x7f00000001c0)) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x0) 09:07:37 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xffffca88}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000080)) 09:07:37 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 09:07:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0x0, 0x70a0}, 0xc) getsockopt$netlink(r1, 0x10e, 0x8000000009, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) 09:07:37 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000400)=""/174) 09:07:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) 09:07:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000003c0)) [ 124.357294] PPPIOCDETACH file->f_count=2 [ 124.380213] serio: Serial port pts0 [ 124.456736] IPv6: ADDRCONF(NETDEV_UP): bond_slave_0: link is not ready [ 124.463758] IPv6: ADDRCONF(NETDEV_UP): bond_slave_1: link is not ready [ 124.471282] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.478551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.486996] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 124.494250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 124.501838] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 124.509347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 124.516734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 124.523977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 124.531548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 124.539033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 125.168160] serio: Serial port pts1 09:07:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000580)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r1, &(0x7f0000002140)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000980)=""/150, 0x96}, {&(0x7f0000000a40)}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, &(0x7f0000002100)=""/28, 0x1c}, 0x0) 09:07:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 09:07:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) 09:07:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000011c0)={'broute\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/4096}, &(0x7f0000001240)=0x78) socket$inet6(0xa, 0x2000000802, 0x0) 09:07:38 executing program 5: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x400000008912, &(0x7f00000001c0)="0a5cc80700315f85715070") r1 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0xfe67) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x199}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000140)={{0x80}, 'port1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x4, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) close(r1) 09:07:38 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000400)=""/174) 09:07:38 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r4, r3, &(0x7f0000000040), 0xfff) 09:07:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) 09:07:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) 09:07:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) [ 125.403587] serio: Serial port pts0 09:07:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x100000000, 0xffff}) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000060000000000000400000000000000a523"]) 09:07:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:38 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000bc0000000000030006000000000002000000e0000054d81418186fd3b90002000100000000000000090bfff70020030005000000000002000000e00000010000000100000000"], 0x60}}, 0x0) 09:07:38 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="040000000000000002004e20ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000900000002004e23e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000044a355f59d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e240000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000623500666e3ca8675283265d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008f56f8797f62bd507dd7bc5f83d35f67624f3e8908f1e4a48dde6e508cccc10e2386d839fafb9322d59d90453f9b299aab769d65d19401de62108ab73874d4f0a3603338b351f3b2e394102a0cc9f28b0488e4f8768b80d14f75206ba8066c10381f9b2373939d810003655c57cc6a7e617ff7c6691a7b2c2f19f5cdf652eb0dfbe2e5ee4045c88e41aebef4efd2"], 0x1) [ 125.466605] PPPIOCDETACH file->f_count=2 09:07:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = memfd_create(&(0x7f0000000000)='nodevtrusted/@@\x00', 0x0) fstat(r1, &(0x7f0000002d80)) [ 125.516663] serio: Serial port pts1 09:07:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x1ff, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x895ff3b0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) r2 = accept(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdfd) shutdown(r2, 0x1) [ 125.569084] serio: Serial port pts2 [ 125.587505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:07:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x895ff3b0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) shutdown(r1, 0x1) shutdown(r1, 0x100000000000001) 09:07:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) 09:07:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xffffca88}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000080)) 09:07:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) [ 126.227849] serio: Serial port pts0 [ 126.237660] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 126.239943] serio: Serial port pts1 09:07:39 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r4, r3, &(0x7f0000000040), 0xfff) 09:07:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28023) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)={0x14}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)}) write$evdev(r1, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 09:07:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000003c0)=@req={0x80, 0x0, 0x3}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3}, 0xe1) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x80, 0x0, 0x3}, 0x10) 09:07:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) 09:07:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) 09:07:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x8000000000004, 0xe3) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) [ 126.351418] serio: Serial port pts0 [ 126.362713] serio: Serial port pts1 09:07:39 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:39 executing program 5: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f0000000e40), 0x0, &(0x7f0000000000)=[{0xc, 0x1, 0x40000000000025}], 0xc}}], 0x1, 0x0) 09:07:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) [ 126.447501] serio: Serial port pts0 [ 126.448415] IPv4: Oversized IP packet from 127.0.0.1 [ 126.448562] IPv4: Oversized IP packet from 127.0.0.1 09:07:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001a00010200000000000000000000ff0200000000dfffffffffffffff0001"], 0x1}}, 0x0) 09:07:39 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc04c5349, &(0x7f00000001c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000013) [ 126.503855] serio: Serial port pts1 09:07:39 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0x0) 09:07:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40107447, &(0x7f0000000400)=""/174) 09:07:40 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r4, r3, &(0x7f0000000040), 0xfff) 09:07:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) dup3(r1, r0, 0x0) 09:07:40 executing program 5: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000002040)="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", 0xfc1}], 0x1) 09:07:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40047451, &(0x7f0000000400)=""/174) 09:07:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)='syz_tun\x00'}) 09:07:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6gretap0\x00', 0xe) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000014000700000000000000000002ff0006667e279639a91d7bd91397917daf427f000000eadc2828417f000001e3d896a27ee8125f42360c00000015739d53d5000000"], 0x1}}, 0x0) 09:07:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) 09:07:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000880)={[{@map_normal='map=normal'}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@nocompress='nocompress'}, {@sbsector={'sbsector', 0x3d, 0x5}}, {@map_off='map=off'}, {@map_off='map=off'}, {@gid={'gid'}}]}) 09:07:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x3) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) 09:07:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) dup3(r1, r0, 0x0) 09:07:40 executing program 4: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f0000000e40), 0x0, &(0x7f0000000000)=[{0xc, 0x1}], 0xc}}], 0x1, 0x0) 09:07:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) dup3(r1, r0, 0x0) 09:07:40 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x3f0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc04c5349, &(0x7f00000001c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000013) 09:07:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) 09:07:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) [ 127.403052] ISOFS: Unable to identify CD-ROM format. [ 127.491066] ISOFS: Unable to identify CD-ROM format. 09:07:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) 09:07:41 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r4, r3, &(0x7f0000000040), 0xfff) 09:07:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:41 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000000080000, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x10000802) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) write$sndseq(r1, &(0x7f0000000e50), 0xfffffe41) socketpair(0xf, 0x0, 0x8, &(0x7f0000000040)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x20}) socket$inet6(0xa, 0x1000000000001, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x1f4, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) 09:07:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x3) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) 09:07:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) 09:07:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:07:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) chroot(&(0x7f0000000480)='./file0\x00') 09:07:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:41 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TIOCGPTPEER(r0, 0x40045431, 0x0) 09:07:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000000000)=""/13, &(0x7f0000000040)=0xb) 09:07:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) 09:07:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x40000080}, {0x16}]}) 09:07:41 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TIOCGPTPEER(r0, 0x40045431, 0x0) 09:07:42 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040), 0xfff) 09:07:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(0xffffffffffffffff, r0, 0x0) 09:07:42 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TIOCGPTPEER(r0, 0x40045431, 0x0) 09:07:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x19, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 09:07:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) 09:07:42 executing program 0: 09:07:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 09:07:42 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TIOCGPTPEER(r0, 0x40045431, 0x0) 09:07:42 executing program 0: 09:07:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:42 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80047441, &(0x7f0000000400)=""/174) 09:07:42 executing program 5: r0 = socket$inet6(0xa, 0x40000000000003, 0xff) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 09:07:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000480)="0a5cc80700315f85715070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) sendto$inet(r1, &(0x7f0000000e40), 0x0, 0x0, &(0x7f00000004c0)={0x2, 0x0, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000]}, 0x10) 09:07:42 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045431, 0x0) 09:07:42 executing program 7: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:43 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0xfff) 09:07:43 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80047441, &(0x7f0000000400)=""/174) 09:07:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f000001ef80)=[{0x18, 0x0, 0x7, "4410051100ef000097"}], 0x18}, 0x0) 09:07:43 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r0, 0xffffffffffffffff, 0x0) 09:07:43 executing program 7: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:43 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80047441, &(0x7f0000000400)=""/174) 09:07:43 executing program 7: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:43 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000ff7f0000f0"], 0x1) write$UHID_INPUT2(r0, &(0x7f0000000140), 0x6) 09:07:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, &(0x7f0000000400)=""/174) 09:07:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:43 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80047441, &(0x7f0000000400)=""/174) [ 130.137769] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.144486] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.175510] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.190006] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.197400] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.205210] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.212311] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.219071] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.225776] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.232675] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.239572] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.248519] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 09:07:44 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 09:07:44 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:44 executing program 4: 09:07:44 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000000)=[{{r1, r2/1000+10000}, 0x1, 0x0, 0x2}], 0x10) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r4, r3, &(0x7f0000000040), 0xfff) 09:07:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:44 executing program 4: 09:07:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:44 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x40045431, 0x0) 09:07:44 executing program 0: 09:07:44 executing program 4: 09:07:44 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:44 executing program 7: 09:07:44 executing program 4: 09:07:44 executing program 0: 09:07:44 executing program 4: 09:07:44 executing program 7: 09:07:44 executing program 0: 09:07:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:45 executing program 4: 09:07:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:45 executing program 7: 09:07:45 executing program 0: 09:07:45 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 09:07:45 executing program 4: 09:07:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:45 executing program 7: 09:07:45 executing program 4: 09:07:45 executing program 7: 09:07:45 executing program 4: 09:07:45 executing program 0: 09:07:45 executing program 7: 09:07:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:45 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) clock_gettime(0x0, &(0x7f0000000100)) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:45 executing program 0: 09:07:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:46 executing program 4: 09:07:46 executing program 7: 09:07:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:46 executing program 0: 09:07:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:46 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:46 executing program 0: 09:07:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:46 executing program 0: 09:07:46 executing program 7: 09:07:46 executing program 0: 09:07:46 executing program 4: 09:07:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:46 executing program 7: 09:07:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:46 executing program 4: 09:07:46 executing program 0: 09:07:46 executing program 7: 09:07:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 0: 09:07:47 executing program 4: 09:07:47 executing program 7: 09:07:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:47 executing program 6: write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x3, 0x103ffffff) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r1, r0, &(0x7f0000000040), 0xfff) 09:07:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 0: 09:07:47 executing program 7: 09:07:47 executing program 4: 09:07:47 executing program 0: 09:07:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:47 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:47 executing program 4: 09:07:47 executing program 0: 09:07:47 executing program 6: write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x3, 0x103ffffff) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r1, r0, &(0x7f0000000040), 0xfff) 09:07:47 executing program 7: 09:07:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, r0, 0x0) 09:07:47 executing program 4: 09:07:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 7: 09:07:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 0: 09:07:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:47 executing program 4: 09:07:47 executing program 7: 09:07:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0), 0x0) dup3(r1, r0, 0x0) 09:07:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 6: write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x3, 0x103ffffff) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r1, r0, &(0x7f0000000040), 0xfff) 09:07:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000240), 0x0, &(0x7f00000003c0)=[@cred={0x20}], 0x20}, 0x0) 09:07:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 09:07:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0), 0x0) dup3(r1, r0, 0x0) 09:07:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x2, 0x248, [0x0, 0x200002c0, 0x20000440, 0x20000470], 0x0, &(0x7f0000000240), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'ipddp0\x00', 'bridge_slave_1\x00', 'syzkaller1\x00', 'rose0\x00', @random="5d91a102eabc", [], @empty, [], 0x70, 0xd0, 0x118}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"f1c0c04af33a95eb2c67b2f63f4808226cd67053fc98ec69373fb0638928"}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x7, 0x0, 0x0, 'ip_vti0\x00', 'yam0\x00', 'irlan0\x00', 'ip6gretap0\x00', @remote, [], @local, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x2c0) 09:07:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:47 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file1\x00') 09:07:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:48 executing program 4: 09:07:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0), 0x0) dup3(r1, r0, 0x0) 09:07:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 7: 09:07:48 executing program 0: 09:07:48 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(0xffffffffffffffff, r0, 0x0) 09:07:48 executing program 0: 09:07:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)}, 0x0) recvmmsg(r0, &(0x7f000000fec0)=[{{&(0x7f000000d540)=@generic, 0x80, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/48, 0x30}], 0x1, &(0x7f000000e840)=""/229, 0xe5}}], 0x1, 0x0, &(0x7f000000ff40)) 09:07:48 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000276, 0x0) 09:07:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 135.489633] serio: Serial port pts0 09:07:48 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') [ 135.532215] hrtimer: interrupt took 51839 ns 09:07:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:48 executing program 7: socket$inet(0x10, 0x3, 0x4) 09:07:48 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabf86dd6050a09c00082f00fe8000000000000000000000000000bbfe8000000000000000000000000000aa2800000000089078"], &(0x7f0000000000)) 09:07:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0x20000234}], 0x1) dup3(r1, 0xffffffffffffffff, 0x0) 09:07:49 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) [ 136.278004] serio: Serial port pts0 09:07:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000140)=0xa5) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x400, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x60000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup2(r3, r1) 09:07:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x2, 0x0, 0x9, 0x10, 0x4000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x17}}}]}, 0x80}}, 0x0) 09:07:49 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 09:07:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:49 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:49 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{}, 0x1, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:49 executing program 0: r0 = inotify_init1(0x80000) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x80000000000001, 0x10, 0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 09:07:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) [ 136.472886] IPv6: ADDRCONF(NETDEV_UP): bond_slave_0: link is not ready [ 136.503246] IPv6: ADDRCONF(NETDEV_UP): bond_slave_1: link is not ready [ 136.512153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.524303] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.532218] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 136.542514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.550535] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 136.557945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.565317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.572800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.580391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.587825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast2}}}}}, &(0x7f0000000700)) 09:07:50 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0//ile0\x00') r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) 09:07:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)) 09:07:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000140)=0xa5) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x400, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x60000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup2(r3, r1) 09:07:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 6: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000000), 0x0) sendfile(r0, r0, &(0x7f0000000180)=0x3, 0x103ffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, &(0x7f0000000040), 0xfff) 09:07:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x40002, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) chroot(&(0x7f0000000480)='./file0\x00') 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 0: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffffffffffffffd, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 09:07:50 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, &(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000280), &(0x7f00000001c0)) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x10) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) setitimer(0x2, &(0x7f0000001280)={{}, {0x0, r1/1000+10000}}, &(0x7f00000000c0)) 09:07:50 executing program 1: syz_emit_ethernet(0x49, &(0x7f0000000b40)={@random="7b32419ab44d", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "75fccc", 0x13, 0x0, 0x0, @local, @ipv4={[], [], @loopback}, {[], @dccp={{0x4e22, 0x4e21, 0x4, 0x1, 0xff, 0x0, 0x0, 0xf, 0x1, "effe19", 0x9, "2798f8"}, "a7cefd"}}}}}}, &(0x7f0000000c40)={0x0, 0x4, [0xa39, 0x99e, 0x633, 0xab8]}) [ 137.197411] ================================================================== [ 137.204830] BUG: KASAN: slab-out-of-bounds in ip6_xmit+0x1838/0x1b80 [ 137.211324] Read of size 8 at addr ffff8801b5f58158 by task syz-executor0/7803 [ 137.218683] [ 137.220312] CPU: 1 PID: 7803 Comm: syz-executor0 Not tainted 4.9.124-g09eb2ba #31 [ 137.227938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.237290] ffff8801b84e7540 ffffffff81eb95e9 ffffea0006d7d600 ffff8801b5f58158 09:07:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000000340)}, {&(0x7f0000000380)=""/50, 0x32}], 0x2) 09:07:50 executing program 7: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f00000007c0)={[{@fat=@check_normal='check=normal'}]}) [ 137.245384] 0000000000000000 ffff8801b5f58158 0000000000000040 ffff8801b84e7578 [ 137.253459] ffffffff8156c35e ffff8801b5f58158 0000000000000008 0000000000000000 [ 137.261523] Call Trace: [ 137.264111] [] dump_stack+0xc1/0x128 [ 137.269476] [] print_address_description+0x6c/0x234 [ 137.276145] [] kasan_report.cold.6+0x242/0x2fe [ 137.282387] [] ? ip6_xmit+0x1838/0x1b80 [ 137.288008] [] __asan_report_load8_noabort+0x14/0x20 09:07:50 executing program 7: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x80080) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 137.294756] [] ip6_xmit+0x1838/0x1b80 [ 137.300209] [] ? retint_kernel+0x2d/0x2d [ 137.305938] [] ? ip6_finish_output2+0x1d00/0x1d00 [ 137.309013] FAT-fs (loop7): Directory bread(block 2563) failed [ 137.309029] FAT-fs (loop7): Directory bread(block 2564) failed [ 137.309042] FAT-fs (loop7): Directory bread(block 2565) failed [ 137.309055] FAT-fs (loop7): Directory bread(block 2566) failed [ 137.309069] FAT-fs (loop7): Directory bread(block 2567) failed [ 137.309108] FAT-fs (loop7): Directory bread(block 2568) failed 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) [ 137.309123] FAT-fs (loop7): Directory bread(block 2569) failed [ 137.309137] FAT-fs (loop7): Directory bread(block 2570) failed [ 137.309151] FAT-fs (loop7): Directory bread(block 2571) failed [ 137.309164] FAT-fs (loop7): Directory bread(block 2572) failed [ 137.371985] [] ? trace_hardirqs_on+0x10/0x10 [ 137.378043] [] ? __lock_is_held+0xa2/0xf0 [ 137.383846] [] ? ipv4_dst_check+0x111/0x160 [ 137.389819] [] ? __sk_dst_check+0x114/0x240 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 09:07:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x112) chroot(&(0x7f0000000180)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) [ 137.395789] [] inet6_csk_xmit+0x27c/0x4d0 [ 137.401584] [] ? inet6_csk_xmit+0xff/0x4d0 [ 137.407466] [] ? inet6_csk_update_pmtu+0x160/0x160 [ 137.414043] [] l2tp_xmit_skb+0xc45/0xf30 [ 137.419752] [] pppol2tp_sendmsg+0x4e0/0x790 [ 137.425725] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 137.432246] [] ? pppol2tp_release+0x2e0/0x2e0 [ 137.438391] [] sock_sendmsg+0xcc/0x110 [ 137.443929] [] ___sys_sendmsg+0x47a/0x840 [ 137.449724] [] ? copy_msghdr_from_user+0x560/0x560 [ 137.456292] [] ? futex_wake+0x146/0x450 [ 137.461906] [] ? trace_hardirqs_on+0x10/0x10 [ 137.467946] [] ? check_preemption_disabled+0x3b/0x170 [ 137.474762] [] ? __fget+0x20a/0x3b0 [ 137.480014] [] ? __fget+0x231/0x3b0 [ 137.485266] [] ? __fget+0x47/0x3b0 [ 137.490434] [] ? __fget_light+0x169/0x1f0 [ 137.496217] [] ? __fdget+0x18/0x20 [ 137.501398] [] __sys_sendmmsg+0x161/0x3d0 [ 137.507204] [] ? SyS_sendmsg+0x50/0x50 [ 137.512720] [] ? ip6_datagram_connect+0x3a/0x50 [ 137.519016] [] ? inet_dgram_connect+0x11e/0x200 [ 137.525313] [] ? fput+0xd2/0x140 [ 137.530307] [] ? SYSC_connect+0x22a/0x300 [ 137.536089] [] ? retint_kernel+0x2d/0x2d [ 137.541787] [] ? SYSC_bind+0x280/0x280 [ 137.547321] [] ? SyS_futex+0x206/0x310 [ 137.552834] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 137.559390] [] ? do_futex+0x17c0/0x17c0 [ 137.564991] [] ? retint_kernel+0x2d/0x2d [ 137.570679] [] SyS_sendmmsg+0x35/0x60 [ 137.576104] [] ? __sys_sendmmsg+0x3d0/0x3d0 [ 137.582058] [] do_syscall_64+0x1a6/0x490 [ 137.587766] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 137.594674] [ 137.596285] Allocated by task 0: [ 137.599630] (stack is not available) [ 137.603314] [ 137.604915] Freed by task 0: [ 137.607907] (stack is not available) [ 137.611601] [ 137.613205] The buggy address belongs to the object at ffff8801b5f58140 [ 137.613205] which belongs to the cache ip_dst_cache of size 216 [ 137.625939] The buggy address is located 24 bytes inside of [ 137.625939] 216-byte region [ffff8801b5f58140, ffff8801b5f58218) [ 137.637730] The buggy address belongs to the page: [ 137.642656] page:ffffea0006d7d600 count:1 mapcount:0 mapping: (null) index:0x0 [ 137.650938] flags: 0x8000000000000080(slab) [ 137.655232] page dumped because: kasan: bad access detected [ 137.660912] [ 137.662513] Memory state around the buggy address: [ 137.667416] ffff8801b5f58000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 137.674749] ffff8801b5f58080: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 137.682089] >ffff8801b5f58100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.689431] ^ [ 137.695643] ffff8801b5f58180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.702988] ffff8801b5f58200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 137.710318] ================================================================== [ 137.717655] Disabling lock debugging due to kernel taint [ 137.723194] Kernel panic - not syncing: panic_on_warn set ... [ 137.723194] [ 137.730549] CPU: 1 PID: 7803 Comm: syz-executor0 Tainted: G B 4.9.124-g09eb2ba #31 [ 137.739368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.748706] ffff8801b84e74a0 ffffffff81eb95e9 ffffffff843c828b 00000000ffffffff [ 137.756703] 0000000000000000 0000000000000001 0000000000000040 ffff8801b84e7560 [ 137.764714] ffffffff81423eb5 0000000041b58ab3 ffffffff843bb8e8 ffffffff81423cf6 [ 137.772729] Call Trace: [ 137.775311] [] dump_stack+0xc1/0x128 [ 137.780675] [] panic+0x1bf/0x3bc [ 137.785671] [] ? add_taint.cold.6+0x16/0x16 [ 137.791621] [] kasan_end_report+0x47/0x4f [ 137.797415] [] kasan_report.cold.6+0x76/0x2fe [ 137.803538] [] ? ip6_xmit+0x1838/0x1b80 [ 137.809140] [] __asan_report_load8_noabort+0x14/0x20 [ 137.815875] [] ip6_xmit+0x1838/0x1b80 [ 137.821303] [] ? retint_kernel+0x2d/0x2d [ 137.826991] [] ? ip6_finish_output2+0x1d00/0x1d00 [ 137.833460] [] ? trace_hardirqs_on+0x10/0x10 [ 137.839502] [] ? __lock_is_held+0xa2/0xf0 [ 137.845277] [] ? ipv4_dst_check+0x111/0x160 [ 137.851225] [] ? __sk_dst_check+0x114/0x240 [ 137.857174] [] inet6_csk_xmit+0x27c/0x4d0 [ 137.862945] [] ? inet6_csk_xmit+0xff/0x4d0 [ 137.868805] [] ? inet6_csk_update_pmtu+0x160/0x160 [ 137.875367] [] l2tp_xmit_skb+0xc45/0xf30 [ 137.881056] [] pppol2tp_sendmsg+0x4e0/0x790 [ 137.887004] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 137.893484] [] ? pppol2tp_release+0x2e0/0x2e0 [ 137.899608] [] sock_sendmsg+0xcc/0x110 [ 137.905129] [] ___sys_sendmsg+0x47a/0x840 [ 137.910925] [] ? copy_msghdr_from_user+0x560/0x560 [ 137.917491] [] ? futex_wake+0x146/0x450 [ 137.923102] [] ? trace_hardirqs_on+0x10/0x10 [ 137.929152] [] ? check_preemption_disabled+0x3b/0x170 [ 137.935973] [] ? __fget+0x20a/0x3b0 [ 137.941231] [] ? __fget+0x231/0x3b0 [ 137.946494] [] ? __fget+0x47/0x3b0 [ 137.951673] [] ? __fget_light+0x169/0x1f0 [ 137.957452] [] ? __fdget+0x18/0x20 [ 137.962627] [] __sys_sendmmsg+0x161/0x3d0 [ 137.968408] [] ? SyS_sendmsg+0x50/0x50 [ 137.973928] [] ? ip6_datagram_connect+0x3a/0x50 [ 137.980338] [] ? inet_dgram_connect+0x11e/0x200 [ 137.986657] [] ? fput+0xd2/0x140 [ 137.991660] [] ? SYSC_connect+0x22a/0x300 [ 137.997449] [] ? retint_kernel+0x2d/0x2d [ 138.003149] [] ? SYSC_bind+0x280/0x280 [ 138.008673] [] ? SyS_futex+0x206/0x310 [ 138.014210] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 138.020774] [] ? do_futex+0x17c0/0x17c0 [ 138.026388] [] ? retint_kernel+0x2d/0x2d [ 138.032083] [] SyS_sendmmsg+0x35/0x60 [ 138.037517] [] ? __sys_sendmmsg+0x3d0/0x3d0 [ 138.043476] [] do_syscall_64+0x1a6/0x490 [ 138.049174] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 138.056439] Dumping ftrace buffer: [ 138.059956] (ftrace buffer empty) [ 138.063642] Kernel Offset: disabled [ 138.067345] Rebooting in 86400 seconds..