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", 0x1000}, {&(0x7f00000007c0)="6f07caea6fd001f756275e1fd158610d052b111a3c614bb92716f4a7a424e488d818761d2d10a85d2bd11d4d7ddf6229dddd3fd444f1db754d85ce45e1dd9a042fa1844b47d6c07c766faafb315ebb6482556d82e9208470c6cd8e31e32a45b2c94c5bc97d77100b23f72548d22608e7a98972007302b01602999c6f0dffafd66ff45a82159ca728859e5fd16eca6e198a48ca337c829f3b201f272da2ea3461d2519ff96963166a520e3728447ed51a9ec702eed9d36a0b7ab73892a644e2e30d49d8a136dc29", 0xc7}, {&(0x7f0000000140)}, {&(0x7f0000000640)="22a24f6a313683edad2b15f343be6b9d93643a0e2ce02e459f172f1d6d7951060d07b1e3bd1b0c93f0811abf6dbdf1b31000d0312d2b4c93eb227615da02f10a3e6a3dd938e83da51c43e501e1676f5fa359fd94101f8edc43e60d3d718882ba185c358e0a7ec5725021ec07cce21934e1df6deb1cd9479d53295fff6031d564c039a9e12fcc654602662109d7be3dcab5b573710a7c3012556bcd15519e808949095a1be6e379", 0xa7}], 0xa, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000540)=r4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r6) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x82, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r8, 0x5410, &(0x7f0000000400)=r5) write$cgroup_type(r8, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r8, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000040)={"73797a4401756e00", {0x2, 0x4e21}}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r9 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r9, &(0x7f0000000580)='id_legacy\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000004c0)) exit(0x0) 16:31:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:11 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r3, 0x0, 0x30b, 0x0) 16:31:11 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:11 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:12 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'bridge_slave_1\x00', 0x7fffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r4, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r5 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r6 = add_key(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000600)="014f94cd59c04da58ccb4ca4ba358fa77401800000c598668668e1f9d92bb759ef87ca03000000000000000b6e5cdd97b74dc54c9429e1b91c631d6bb2b9c5554177c798f65de54a27c3c9978b70339c8244525596eff30e67f1b6a86a60a36b4a5384955417", 0xfffffffffffffc9c, r5) keyctl$search(0xa, r6, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) exit(0x0) 16:31:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:13 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() creat(0x0, 0x0) 16:31:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:15 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() creat(0x0, 0x0) 16:31:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000600)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r5) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r3, &(0x7f00000001c0)='threaded\x00', 0x9) connect$inet6(r6, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'veth0_to_bond\x00'}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000440)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=0x0, @ANYBLOB='\t\x00']) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 16:31:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() creat(0x0, 0x0) 16:31:19 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() creat(0x0, 0x0) 16:31:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000600)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r5) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r3, &(0x7f00000001c0)='threaded\x00', 0x9) connect$inet6(r6, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'veth0_to_bond\x00'}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000440)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=0x0, @ANYBLOB='\t\x00']) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 16:31:19 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:21 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() 16:31:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r3) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000100)=0x7, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r4, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0xffff, 0x0, &(0x7f0000000540)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r5 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000300)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) exit(0xe) 16:31:22 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() creat(0x0, 0x0) 16:31:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:23 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:24 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:24 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:24 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) 16:31:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:31:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@ipv4_newrule={0x20, 0x20, 0x1}, 0x20}}, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={&(0x7f00000002c0), 0xc, &(0x7f00000056c0)={&(0x7f0000000200)=@ipv6_newaddr={0x40, 0x14, 0x90b, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @dev}, @IFA_ADDRESS={0x14, 0x1, @mcast1}]}, 0x352}}, 0x0) 16:31:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) [ 611.494578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. [ 611.507055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 16:31:25 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:25 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) 16:31:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 16:31:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:26 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:28 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:30 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:31:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x45, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="11634840000000000000000000000000080000000000657a81a1d1927724000000000000000000000000000000000000000000000000080000000000000000000000000001"], 0x0, 0x0, 0x0}) 16:31:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f00000003c0)={&(0x7f0000000140)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000380)="f0", 0x1}], 0x1}, 0x0) listen(r1, 0x6) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local, [0x0, 0x480000004c000000, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1}, 0x0) 16:31:31 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000800)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x74}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 16:31:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 16:31:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000009c0)='\x00', 0x4) faccessat(r1, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x8001, 0xc112, 0x33c3d494, 0x100, 0x0, 0xffff, 0x400, 0x8, 0xfffffffffffffe01, 0x0, 0xf48c, 0x6, 0x400, 0x1, 0x8000, 0xfffffffffffffff7, 0x400, 0x3, 0x8, 0x8, 0x401, 0x1, 0xa04, 0x6, 0x10000, 0x7ab, 0xd830, 0x6, 0x400000, 0xffffffffffffff81, 0x1, 0x40, 0x2, 0x2, 0x9, 0xffffffff, 0x0, 0x5, 0x7d2c18577c18b782, @perf_config_ext={0x0, 0x9a3c}, 0x7504, 0x8001, 0x1ff, 0x0, 0x5, 0x100000001, 0xd7}, 0x0, 0x0, r1, 0x9) execveat(0xffffffffffffffff, &(0x7f0000000380)='./control\x00', &(0x7f0000000640)=[&(0x7f0000000440)='cpuset\x00', &(0x7f0000000540)='-[lo\x00', &(0x7f0000000600)='++cpuset.security\x00'], &(0x7f00000008c0), 0x1900) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) fchown(r0, r2, 0x0) clock_gettime(0x0, 0x0) socket(0xa, 0xa, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:31:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:32 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:32 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:35 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:36 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:36 executing program 2: pipe(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:36 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:36 executing program 2: pipe(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:36 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:36 executing program 2: pipe(0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 16:31:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:37 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) 16:31:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:37 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:38 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:38 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:38 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:38 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:39 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:39 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:39 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:39 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:39 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:40 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:41 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:41 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:31:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:41 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:41 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:31:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:42 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10}, 0x10) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 16:31:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:31:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:31:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10}, 0x10) 16:31:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:42 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() 16:31:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:31:43 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:31:43 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:43 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:43 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:31:43 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10}, 0x10) 16:31:45 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = getpid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000480)=r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r3, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r2, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r6) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000008c0)=ANY=[@ANYRESHEX=r1, @ANYBLOB="5ed5ec3133e17a9920c63ae01c39e25418d8555d533a6debdec068cabdfa389da3501404358c629cff5b8e2cacd741fbea29f2db8613390151731a303fc875b2442cadca2cff53b6cfadc76ad6fdfddc47bf2aaca53666f6a6a29fbba809a856e41e54b2e845c0d76477e5cc730bfa94acf6cc206bd27848a3dadbb640b9e43df8e41bbe0d", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYRES64=0x0], @ANYPTR64=&(0x7f0000000780)=ANY=[@ANYBLOB="b1a55baf2d881eb57935b8435aebd02f268328f761bf8a0d836f178ee32c3a6d2af81758fd63d6c407730bdce702ccb4603c2339d779ce03924d8bde93835df8cc6514d874725d081bd0c58992ec6fc059b23c47b40fbf75405c74d62cc55d32e42c7ac08fb82a0139e6ba7aea3d7aa3cfe005eb68827ed9f40311ca2250d87a47eae356b91d2af476410b93f4f8eb", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRES64=r3, @ANYRESDEC=r6, @ANYPTR, @ANYRES16=r5, @ANYRESHEX=r4]]], 0x1dc}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r7, 0x5410, &(0x7f0000000400)=r5) write$cgroup_type(r7, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r7, &(0x7f00000002c0)={0xa, 0x4e23, 0x6, @remote, 0x6}, 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r8 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r8, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f00000001c0)) 16:31:45 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:46 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:46 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:46 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:47 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) lstat(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000440)=[0x0]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) stat(&(0x7f0000000500)='./bus/../file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = getgid() getgroups(0x8, &(0x7f0000000680)=[r2, r3, r4, r5, r6, r7, r8, r9]) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) fcntl$setown(r0, 0x8, r10) r11 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r11, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r11, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r12, 0x7002) mkdirat$cgroup(r12, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r13, 0x0, 0x30b, 0x0) 16:31:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:48 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000600)={0x3, 0x70, 0x9, 0x9, 0xa8fe, 0x6, 0x0, 0x100000000, 0x20, 0x8, 0x6, 0x0, 0x8, 0xffffffff, 0x9, 0x8000, 0x3f, 0x9, 0x401, 0xe63, 0xe91, 0x0, 0x75a2, 0x38, 0xe89417b, 0x6, 0x2, 0x0, 0x10000, 0x40, 0xc680, 0x49, 0x9, 0x7, 0x6, 0x7, 0x10000, 0x2, 0x0, 0x81, 0x7, @perf_bp={&(0x7f0000000100), 0x8}, 0x2210, 0x7f, 0x6, 0x5, 0x6, 0x5, 0x6}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000400)=r3) write$cgroup_type(r5, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r6 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r6, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f00000001c0)) exit(0x0) 16:31:50 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:50 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:31:51 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:51 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:51 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:53 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:53 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:53 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x110) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e20, 0xefa, @mcast1, 0x40000004}, 0x2a302bc81acec518) r2 = eventfd2(0x91, 0x80001) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="a609000000000000c47b000000000000040000001f00000002000000000002000100010000000000e8040000000000000400230000000000000000000000000000000000000000000008000000000000000000000000000000f8ffffffffffffd30800000000000006000000008000000000000000000000000000000000000004030000000000000000000000000000240bdeacde088dd4610227"]) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000003c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800000, 0x4002011, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) write$P9_RREMOVE(r3, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x2}, 0x28, 0x3) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r4, 0x9) ioctl$RTC_AIE_OFF(r5, 0x7002) mkdirat$cgroup(r5, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r6, 0x0, 0x30b, 0x0) 16:31:54 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) sched_setaffinity(r0, 0xfffffffffffffee3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:54 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:54 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') 16:31:54 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') 16:31:54 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') 16:31:54 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000180)) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() socket$inet_udp(0x2, 0x2, 0x0) 16:31:55 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') 16:31:55 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:56 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) r0 = getpid() sched_setaffinity(r0, 0xfffffffffffffe9b, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r1, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10d070, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) write$P9_RREMOVE(r3, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") fcntl$getown(r2, 0x9) ioctl$RTC_AIE_OFF(r5, 0x7002) mkdirat$cgroup(r5, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 16:31:56 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fadvise64(r2, 0x0, 0x7, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:56 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') 16:31:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 16:31:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000400)=r3) write$cgroup_type(r5, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'vlan0\x00', {0x2, 0x0, @loopback}}) r6 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r6, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f00000001c0)) getsockname$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000480)=0x1c) exit(0x0) 16:31:56 executing program 4: pipe(&(0x7f0000000200)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000003c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r6, 0x0, 0x30b, 0x0) 16:31:57 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:57 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:57 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x9, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r0 = getpgid(0xffffffffffffffff) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x84200, 0x140) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) ptrace(0x421b, r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r4, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r5 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) exit(0x0) 16:31:58 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:58 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:58 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() creat(0x0, 0x0) 16:31:58 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x9, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r0 = getpgid(0xffffffffffffffff) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x84200, 0x140) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:58 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:59 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fgetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f00000003c0)=""/132, 0x84) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000001c0)=""/92) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r0, 0x9) lseek(r3, 0x0, 0x2) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r4, 0x0, 0x30b, 0x0) 16:31:59 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:59 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:59 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x9, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r0 = getpgid(0xffffffffffffffff) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x84200, 0x140) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:31:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000003c0)='syz_tun\x00', 0x8, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r4, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) sched_setaffinity(r3, 0x8, &(0x7f0000000100)=0xfd3e) r5 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) exit(0x0) 16:31:59 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x30b, 0x0) 16:32:00 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:00 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='auxv\x00') pread64(r1, 0x0, 0x30b, 0x0) 16:32:00 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() creat(0x0, 0x0) 16:32:00 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7ffffe, 0x4002010, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r6, 0x0, 0x30b, 0x0) 16:32:00 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7}, 0x7) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='auxv\x00') pread64(r2, 0x0, 0x30b, 0x0) 16:32:00 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='auxv\x00') pread64(r2, 0x0, 0x30b, 0x0) 16:32:00 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r1, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000780)='./bus\x00', 0x420000, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000003c0)={0x4, 0x70, 0x7, 0x9, 0x100000000, 0x3, 0x0, 0x10000, 0x4c, 0x1, 0x0, 0xfffffffffffffffb, 0xb37, 0x9, 0x0, 0x101, 0x6, 0x1, 0x8, 0x9, 0x4, 0x5, 0xffffffffffff0000, 0x0, 0x1f, 0xffffffffffff944c, 0xcf, 0x5, 0x40, 0x7, 0x8, 0x40, 0x2, 0x7, 0x9, 0x1f, 0x4, 0x7f, 0x0, 0x100000001, 0x7, @perf_config_ext={0x1, 0x6}, 0x8008, 0xffffffffffffa252, 0x10001, 0x1, 0x6}) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) write$P9_RREMOVE(r3, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r2, 0x9) ioctl$RTC_AIE_OFF(r5, 0x7002) mkdirat$cgroup(r5, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r7, 0x0, 0x30b, 0x0) 16:32:01 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:01 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r4 = fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='auxv\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:01 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000200)={0x9c4, 0xffffffff, 0xfffffffffffffffd, 0x7, 0x9, 0x3, 0x52fd908, 0x7d9, 0x1, 0x2, 0x3, 0x7}) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r6, 0x0, 0x30b, 0x0) 16:32:01 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)=ANY=[], &(0x7f0000000540)='syz_tun\x00', 0xfffffffffffffea6, 0x2) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000004c0)) connect$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x282, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1000, 0x0, 0x3}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) ptrace(0x421b, r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffee2, &(0x7f0000000680)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000400)=r2) write$cgroup_type(r4, &(0x7f0000000740)='threaded\x00', 0x9) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x9, @remote, 0x6}, 0xfffffffffffffe07) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x10000, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) r5 = add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, r5, &(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) exit(0x0) 16:32:01 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) pread64(r6, 0x0, 0x30b, 0x0) 16:32:01 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r4 = fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='auxv\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() creat(0x0, 0x0) 16:32:02 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x28) ioctl$RTC_AIE_OFF(r0, 0x7002) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:02 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) write$P9_RREMOVE(r2, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x50000, 0x0) fcntl$getown(r1, 0x9) ioctl$RTC_AIE_OFF(r4, 0x7002) mkdirat$cgroup(r4, &(0x7f0000000380)="00598b3100", 0x1ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000200)={0x2695, 0x4}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='io\x00') pread64(r6, 0x0, 0x30b, 0x0) 16:32:02 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0xbffffffffffffffb, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x526) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r4 = fcntl$getown(r0, 0x9) ioctl$RTC_AIE_OFF(r3, 0x7002) mkdirat$cgroup(r3, &(0x7f0000000380)="00598b3100", 0x1ff) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='auxv\x00') pread64(r5, 0x0, 0x30b, 0x0) 16:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "51d4458d820fb6890351510b4739ea58f2275e718d8ea845d6adb7eb67c20d2fc253362c238c1cbd2bccb3c75f3691371965e9fb793d836ae19b1be96305bd7a6802443174bbaa9a612b09eb94ab08ce568189cdd39b09f212cac91f05be2ca3c3bd4b6fdb68a95cde1c97b8eaf72d76fa717e1e813db7e24727448cc8a37050c306c8f9ff0d1c0237734f38d81fe52586e9474a710dac054a5e9600e730ef0a900a7d92e540d6523e3f93ea8c45059f9c5b5fa14c4152d87a1527c70f930e7f2d9ef755c763feef4e4473286cef91fafd5bb9086776e30cce53225b2afb5fdcc53fa41b490adff9873f3ac0716d15dcd297041b61990a4a044855163ed119170f9920ac6a646ec24412b27cf18135e36885f756e51ca37f834c7484644ab8862c40cd6f371cdcc4c471140676d5e5b0331c83bec79113ac5ff26408b4ae110d7e705926398f58f08e116cc7379f53e81749f894832ad95cc416c4e3646545d185a5633b2b5cf11520650582427f365b586ccaa4d20f9ed7ec26d138d70631a35a37b7a9d939776119231425353facb2acb6ce93468d7533dadd539c618295f680c8b7b120c4ee5950dd953925ef82c5477aefc59bebc2882257991772f936da450cd7c7ebf3600facec438ad21a2226cfdb1918910c68afff8ca0eb6b5e283b3f45f9f41cb8fbf9b2d9c96f5e7802fd72d2f0114b7b141d249b46de44a9d3de50593a3ce8415c45a6942dfb949870da8feff00b6033d24bef6c6f7f1966c8c3743f7126010ce07e6757be5ffd8140db6da7e1fdf2416d2d8239ef96efd319febfa76033a31e422fd81f64c98d60fc6600b6039a7719eaa7b101daea5532ffa5bc5cd77ba339b3ddae15220b1c4fbe37f8e417f0c9d3a2c8c3d7516d4550aff9ae8f98ee30eecccaa4a0ed316e683d4a09443331e75da358fc350c772af2ba15b4f1e7434ff027d65ee4c8e7476951ec7809968a4c2ab6002319fd9bf75292468293e9ca2d4547a1a4b910830fa070314cc42b5905a3d5a736f1780b2d436ae52c98d51925ae0f9f234ec5780a5083af24878f6a02c9bd465748d9b0a04e829307f064d65122cd525db786d2244949703aaffb877e3a19d65bce5c3c8ea3189d788645b86e5e2321906295dc6eaa60c51f2d47d99de519aed18ab3e85b5d5e051a12c22b08d13bf46cbdf9610305afec96c3c3c1ccae6846782d36a39aa7770cff21626dffe6db2fba647dcb6b8a15672ab4b3bd9747b8372923998755d5d5ea77c6534e0da6976639d7ddc7432b00e216324e6080449a2cbc09a8a2df8076bcbb626a6dc03f4d326a68fc43167ddbd15fac866b6d294debed22c72c4d8c3bd692dc45c1e73e40d766299c401b2eadebb24d38bbdacc1c34c876f2e7894043ca69036e04927c04efca4a16ad4adaf6179cfa2c1ca69be1ea7c76ea26fba0470477db39b02ff0220e24ed81ff9f2313ca0df6b500c114aaefaaf7cff9cc5b238e7c1177e67ade4ac6c29e582f56b1c9e779929fd6c4d60e22ad304d003a97e5a00b1921649299decb889afa11605e5ad0d70b230ea61cef5f90b29b3d0bd7e40046d000ab0229f30fdba528ca3c0a8207fbf02dc2a1d232ca9b29e39732334e89a79cdbb4ca77c5208ee782970996b0439159c4458f7ad41a9f296dcd9a5d2ac08a7666f17ec273724b21d33603dce67772bffde286abe7fe33445252751622982e362729a42007fb01102ee37b0bc433baa9cc0f958a0603aeb797e190ca285c7a4b3c68a9a696c1d4b6a7614fc78b4c0f9c34556136d50024d6c241a005efaa08843e7b0dce7240ce445e32904c8dbf0d0e6685dbe5f14627218979513269965ef7c1e34509b54fa9ba7bde993c8d6f53a76a7c89508681b83aaa8672c196f5804facc484d476317172a85850be460a289a84242d50df3614614b9a5fe3f162c03ce17530736f4d171785c08754471faf41577ee61cff4fdd37e1b76e54a8fb8e40a89b21c5f3c22d3106524192f96eb6ef757899e32696aa41d0def5679bcb555484cc17cb6f40d8998b71d34a4ac0834d38339fe709eba082c56ddd7ae8e698d52dfcc961dba263b110bedd8b7e4d4ce1f4be715c57311f9b9884b851f63cf90ef7d9b62df03fda8c7fdb0d90ac3e8fc8acbcac44d253cb7d5887e1c68447af7909f595ae683f69211ad9be7bd64e578eefaba55aba60629671abbfcb221f9c53d04ec31bbd5870c361a4a8ff1d1ce496b39baf623e7ec69ca2051edd07f673c1acfdf88e4050cccfe8f56068d832f0ac6b526065bef2a75c99a3f898c2bee6614bb3154f5e04249660ebbd73adff59763ca389db631944e610511caae3c4312627d25d30e2c2ee35663868373c228d2d166d722fe8a1f27a3140e927330488d853081178aeae31a553303c503773d778622ae9072a00f374d79649b84a909084f93b5c93f6e591c84d01786082e3d6c698cfcffb2c76cc474842f12c1526ea2796be36367de618a132a11a69948895be5487548a489068475a1a38375137b5f5b92a7f20b61e749eb35b63c83df707ac5c8fa07dad9b84bc7490efe11304857eb893ccac56bb70917aedb684ffddc8686365d8ca1e6c1008a5f26ed05b976720ff5c42462313346efdf2ccaa291693a7170d33ce8e64278e1088fa5013e1b62e277920d2a68d37068e29f08658d0cc4ce7269907968526ad0fb21d27090cf61a5982ad3f2b0dd4bfc5aa8da91a366c9ca3b122e4b19afd99bcd9f9ff2dbc7239f29b41e86159149bd282fe30315c9f0dfc8058f1afc30f7c40b3142eb2f8b0b9ee939e5854421778345eeb91d7fad1e803df575ce3d41c7280bb56215b10247e62ba94c2bd59a7d29a89d5eb9bcb15609f30a15ccc2827e9802708b535eadc198a6b52c4cb2029f3b92e6482f7d585ed285911890c56a0390c91d64caed6cc34a925f17b1f114d947a521c6e2f5fe6793d29f024dd75560815333eadc0f9ebbf421993c90af8f88fe3b3831b0feb6014ddaca01499ee918cf5dfb851f1d9909c9dacbc9c0df8864267ce04d19f6a70a5dacdd3db320924a8b14ef513a5f4239c9bab41565f06498851b8b13b43eea2a9b609e4ecbdf1a976c4e48795a08ef718999b3f62347e69e58e1c42d2321e69de8c520100db09b5ad3fcb1ac0ee17bdeac112d0b6f5d4597067fd26c12d0b6fed5d776e0171982828ca5009ce550821f9ba600f3a1ed10a83abe9f39344e83d3bebd4ea7c64b0d4d91284b109f024a46868b1a8500afecd7b19bc7740290c633f4473727dc5bf94008a02e6af1388597e2985ed086e9e1fed3b85f1582f859c650378211df2ec5895d76c7f319419877c3873606d0af61789aa2f9cd33556b7404697a3db5a724053a91cead452c4e01a3e5dcd57330d8d44e859a7f548f886ec2c3e2a693892b4fbd357b017d625e92939a67a2a96a39a9e9568d2f4f06d5d860273755fc3700eef7ac0880dd3ab0ea206f84f08fff15fa768918eb1ac33350e26cd6acec75c0c7a6e896d56b4e84d9157ad24a78e120f44d72f517290bb64a4115a19663c1b816923852530ce2426c96f0ab7990f4558eed258fa2405c1a5c4abdd44c1d51b6ac65da4e92050b7222fd62dbd4bd6784ca75b11b4e2658f31a1e8c0a358131a7a0d2e2dea2a39d9c651d2e2ccc7bfdd37c95f7593bdaae5715c5d81e1d0dc8b10a0a992a74c685304fe20983bde779abef21fac571afda97a27acd9d02c9532df98b1b2e5d2bd117042ab995b6ffb8366fa810e9fe2a9d7b2097350e6daaed34799d6bea556cc152d2f121dba497a85262f4eefc6e077bc9f265329ca58a0edacafd1d41592eedc2d9fa0953d7f58bc00f2a2fddb97f833bfec4ea70ce9f7907e548621e3808a3ccfd3bbe26a78c64e9f7449725b0cc0248e275e2b8857b0b2bbc192cd42f766b458ff4f52b1786d86a3d321d4c0681e70cedcd353f6758bb9bc1cd25aed9ab2fdda3f60ea3f793f3f00f9e2a0771b3eb995ae81d72d99558b268b7276d2a3fa227af2b3b977982c6c8be20b55ef1835a8c623c941e43d5fe805021a6844e9c6cbde2bbd6dbbffa1e60ebc8a9c26eb35a68ef0d30a14a08f4b74d176d0b5473fa111e2d85529db2a63adf95429f30edf2151b4b51e16202e9084f0fc67beb26a0256db8e60595478cdc1831ec817d4db687b31a8333bad36d31afd9ccd215afafe38d79ab397d54eb87756df6ea74ae9a51c7436447197f2990faa0e8dd12d5cd94dfe491bfe3ff684d566ae2d172c781029fb11e54ba20a7b4973cbf9893131a94ec7ced8551efa4a50512a64c23364c33b5a73c5b274e97c761e93aae293142d12d5d4235cf667ea6025ae600b99cde80c000ccab907d64cb96e834ff62b048c4aed5ca67fbcac64cffebac4e8625e5ec78c4dcc1fb3b4aed6ae673085bd3d5c72352d81dbf383b7d6d85a148c49ab6b908a09012f901b0cad6c6173bd76a358d5651d9156ea18dbf3d0e22bb21ad77043faa37bad3df6a570db273f542ce8a572249682e5d5fd6659e46690256897db5eb35c703036e0886e6a15c5157f28e0679bc9e312b247f4c639aaf3e81e047425e5b16be02d072e502809c440655c59e7c80d92b36d1b589391b8ad6f7b050fe2c14f2ff6ad133e1dac255383e342a6403b19cb2fc62731aa986391d901edd0d0a1f19930f60ca6fa22263ff7b00f9263dbf0b0440b30e96f191b6e41dac7d319617ce10c5387e53fe64691e096d69dbbc7e276427f5575c002e1de5cb65092b3a818e4fd2f6e682561cbfdbb4f17b65d17dfff458d3a5881f7832799a42e0b38458924f667ac40d4a83247ae3e4685aaf174497b6fd01b068f0cd88efc2f3807573d4b2bab763f666546b4cead3d5263f6b31a14daaa82877c30175789d5aec83b667bc045be0368734caa79ec3476071b211870d21dee45f8073bb14a26b7d03aa5de83a2febcc63c0a603b27c01656fe3adb460b90b428a552fcd31f86ae0d9de624b3e1fda04990f87760da7d5bea7122a8846e7ad5c13c743c285f4cbdd7e86f5478659a422e466584ecd40026a86a55896e7fae83fdd990cd8ae0562b069a1f614736a440937ea6ed9c9eb315d1637d7b2103d75d4ced145dbd59a6ff99ccad2e194cfa9fe98bfc6b0f8e609f5a82816e03f87abeb94fc68e3020135211d0dc91742e0ab07614a265bbadd141e10c68e51b5d510d6582093de17c265285b7bb2e5052bb898a8adf020493887a2663febc07d70f463e212a2f172d0b05deb1c3d3cdc9898031eeadb6d494e647e4f6bd416f43fd94dbc287d9f32457c400101d50a98bdfca5ba66cc4b254a3fc1cedccfcc99c7df18ca968bd7a13980310f97ae8183db101904fe4a628bcc5f9d2a31fccf9b1475784af201edff7b5dc0f47e253de64f7e93fd70289bc503fb359a1cc8207c05a607cd93a4ea3f048250c59d636b675adffac069ed133e7393df3142dd2ce638f38d14c2b1668a2ad96d7219273293441f50971409841ff00e73bb298ddf5407da5374c1dd66cfd5f30414c1bb265109f75e0df8fbd3e3fb3772e0181219da51879c99283e4408380eba25dee7439a34390f3ac14e9d3b81ae21a682efeada6c87b8b6b693cb955253c233f48fcec753f35a80a1ee67e2fe4691cbdb0086108210a78b416465a03a01e8c6e1ab3a81b84d13d0d0a36173aa902b5755a99bf79a6e65a677efbc0e28daa535a39f7a73fdce457d25e366ab865fbfac3138ec3c2bf387ec0663c30fd6b8d35381fdf11b7b4b0cad059990a136ebd", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0xfffffffffffffdde, 0x0, 0x2}, 0x10) 16:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80400, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x80) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r2 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)="37b1a289ca864fdb273cae6cef0961dbac2df30f1a2bc77b8cc5d5299a43e8a009dab8ea46aced57e182f2b6f162ba3d403c72a4cf146e91ede8db4dc2472e15f9ed51144ebd8d85bf9d61d70091b677958f0ed42ab5b73fa561339b981dad39071fd5fd2fc04281bbaf76cdc0c892693df874a64ebc3988b02797d88e1b32", 0x7f, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000340)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '/dev/fuse\x00'}, 0x20, 0x0) 16:32:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'syzkaller0\x00', {0x2, 0x4e20, @multicast1}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x3, &(0x7f00000001c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030cd8a878334303030322c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) epoll_pwait(r0, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0x0, &(0x7f0000000140)={0x1}, 0x8) 16:32:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:02 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt(r1, 0x0, 0x7f, &(0x7f0000000340)="c24b487e2aaa764f8f8ceb7cdf8970479b2d5e75aa24775d6db8de2c4ef44d485e0fc4aed494058d1eb2d906514510a16378bc03e4daaaca6fd273cef9281a7c0eceaceb32bfac1af55f025770e419d10bb37defa311919321d427d58673701745865c12c287f3a694bcf3ceefff3186833183288dbc74ff2d658e26e50f2f72c7be30123a33910e909d7ffca62aba7ab25b91588a7f9ba5305baa15afae3e5a42ce7462571bc6355977d978074f2dfd3fcbc2201d21a8c7dde517bb7c8103d6df9eed5593e4", 0xc6) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000200)=@l2, &(0x7f0000000100)=0x80) getsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000180)=""/52, &(0x7f0000000340)=0x34) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/9, 0x9) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:03 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) recvfrom$unix(r1, &(0x7f0000000400)=""/148, 0x94, 0x40, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6e746d6f64653da2303030303032303030303030303030303034303030b081ff7365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c6772000200e46964e5e6412220895ec5067d76b63f8e63703d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat(r0, &(0x7f0000000100)='./file0/../file0\x00', 0x8000, 0x30) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() 16:32:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x2, 0x0, 0x0, 0xffff, 0x6}}, 0x4b) r1 = openat$selinux_policy(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0x43, 0x9, 0x1, {0x5, 0x24e, 0x100, 0xfffffffffffffffa, 0x9, 0x8, 0x3, 0xd96, 0x1}}, 0x43) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:03 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20001, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x10000000000a0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) io_setup(0x2, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) nanosleep(&(0x7f0000000b40)={r3, r4+10000000}, &(0x7f0000000b80)) io_submit(r2, 0x9, &(0x7f0000000a80)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r1, &(0x7f0000000480)="0dedaa8cb2f31a61f891f56426af992982cacc39072e6db62daf15a1b9db08b5fce1870dbb95369133d8645496b9e492f8a502d7a3b5a64e0ecca1412c0a3a5c4961b33f719757c58f2d309d401d6ac992548785bff8e9f81cf358c7732cb2df886ba9b3569148eba8936c87393e5ed8bf6596d4347499539cd84f423ca54abfbc43ad0d9c2e8f1ab84b053947d1f05594999c409641c8a6bb59eccd2f8c861f3105b21b4a4391d2f013193c9d90592bc17d44f65d2d429e105d13f8046081cf6a9e63755b8f33c42afd7745bb3c1098fe0e97e4883f874c3aa44868789ef5e3fe73a7a5bd4070b32f30f5e545bccdf158", 0xf1, 0x8, 0x0, 0x2, r0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x0, r1, &(0x7f0000000200)="dbc412733d66871ba4c8051cac099a1841bc199f450522b5393ff291ea30239f308e3561", 0x24, 0x80, 0x0, 0x1, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000580)="dc8aa4e85f3fa5ba1c64d26a4912bebd68ec845b0c1206d87aeb9601f350e851536bccab88e7610823f06f5683243b94b438776656f5cf318d5142538661f1e7979cea983871ce85509993565e7f985d5d69c01ce5d43071756e93ed508d10cdad2131b16080feafd2b364fd02907c4b2aab1020ab48dbcd8cf6a20dc1dc972e8a46ce3ae2fbf83c1d502ffd6a13619e848f799ca8e6aad87fece155546dbc2f1bb8082885eec3cdde70f8cafd648ad4ac13b9255bad85db6ebc6d09140f09e5", 0xc0, 0x8, 0x0, 0x0, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x401, r0, &(0x7f0000003000)="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", 0x1000, 0x3, 0x0, 0x0, r0}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0xa, 0x1, r0, &(0x7f0000000640)="ba5c9f217ecf06d18b254e0dd80193c03521b3e91c9bb40c88acb51b721943e5f05456582e34ebd1e40e3896b398b7ecd2f5cfe05f19f99aec781bf09e9257d29c52a81b0571c92431da7ffeff1f895483a41af3ff00d5392d28bad9f7791b6e013d2720a3e8d01829aaf3d9a3f46eb28cbc19a12be9f6736e2a18e7aa4e768157657dcd683bf2d2b6a84854e391e19024d25b8a00141857635968e1563fb364fd15cae6bbf12095c91dfa6faa933df7990ae16ce4c93eac83558524", 0xbc, 0x3, 0x0, 0x0, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r0, &(0x7f0000000740)="742026efc8efe59653481dd0867b8581a176d886874f1f13ec9820b872c39c9bb0a4a9956699f2cad68d7d5c780ec317f677d1624364fffe870aea", 0x3b, 0x1, 0x0, 0x2, r0}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0xd, 0xa53, r1, &(0x7f00000007c0)="646fb0bc878b9d481533722cc41a820719749f1ba4cacca2984e6a648b9be2a6691052e87247caad343e31ee17ca1e0b76a01af7b124e6bf528463ed80f5153c7881141ae1097d6d54fc2a9221ea5be0a6", 0x51, 0x7fff, 0x0, 0x3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000880)="ae353d30bad330e94ca568194dfae31f4f3415b856ca9b37d0661f0f3657d05d145fe85e7f099c0ff071e54f494ad06a580bf9f6bcce39282860538da86d0410cabde86cea7686c51570fb11744df04dda2e982e8fed132d3a033520345193bbb95ed37267d4909c607024d15bd3a6287f358b3e009906a62efbcda4c08c9b", 0x7f, 0x3, 0x0, 0x2, r0}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x100000001, r1, &(0x7f0000000940)="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", 0xfc, 0x3ff, 0x0, 0x2, r0}]) lgetxattr(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465640900648775ffff000000000000b0"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) write$cgroup_int(r0, &(0x7f0000000bc0), 0x12) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x100}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) pipe2$9p(&(0x7f0000000c00), 0x4800) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 16:32:03 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) 16:32:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:03 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2000000000002, 0x5, 0xffffffffffff7302, 0x100, 0x3, r1, 0x5}, 0x2c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) r3 = request_key(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)='#vboxnet1wlan1[^\x00', 0xfffffffffffffffb) r4 = request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='\x00', 0x0) keyctl$link(0x8, r3, r4) 16:32:03 executing program 4: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(r0, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='@\x00', 0x2, 0x2) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000 00040000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0058b1cd913f31e0352cd481aff37a78eb13e70e09e2d7bf84d7ec852375811cb577d208d5963292543ac92295b5036b1b4e866bee04a83fa067768630405f3120924d1772cfbf16143e2f6655dc8790d4b94b6b409f9859436332c7364bc1f58b0ea45b4042e1043746d2260f2dd7b3fe07c90287d643a4a5ec23902d4810afef53"]) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000280)=0x101) r3 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240)='nodev%)\x00', 0xfffffffffffffffc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0)=[@timestamp, @window={0x3, 0x2, 0x9}, @window={0x3, 0x7fff, 0xef}, @sack_perm, @mss={0x2, 0x4054}, @sack_perm], 0x6) keyctl$revoke(0x3, r3) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:03 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sync() mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303074303030302c757365725f69643da6b33ba3d2fb4f0327a5049537e3a136097db3871a35569dc01365bc08db8b239e409aa045f2446d2605f8e4042b629c0172ed9fcfdcb780273c2224fb20fc99b29bc2bce1117c33845fa1c14a8773585a9a2896f19ac3a4c064ed0c5b6db583b2da3ad3a08a7685f6b9ae21b9fa3db8ff33748cb29cc441d713971c4ee309dde543f916bcbfb599be0dedfe7ec93e840f1fdbdd9a7b95f8d738a173db99f1c6dae4a3dfaa304988569a029e", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75bf09000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x11, "c4083d75b8f45ebd7099"}, 0xc, 0x3) 16:32:03 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)=@random={'trusted.', '/dev/loop0\x00'}, &(0x7f0000000980)='}\'+}@(\x00', 0x7, 0x2) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r1, 0x0, 0x10005, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = request_key(&(0x7f00000009c0)='logon\x00', &(0x7f0000000a00)={'syz', 0x1}, &(0x7f0000000a40)='\x00', 0xfffffffffffffff9) keyctl$update(0x2, r9, &(0x7f0000000a80)="b74461531a7d28c0640cc0cba53068b26486b8b8bb391e655f033a17f03783a2c0dcf68cdc6360dbd40bf5a2355cdbee04bbc39a93750dda8385d724fbdad4543ea8eba8ae84e6e5aed8ad0b7883433df07a2e5aefc1ae8446dd45b0c7faa09bc82f309a54e2b25427", 0x69) mount$fuseblk(&(0x7f0000000700)='/dev/loop0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='fuseblk\x00', 0x1000080, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type'}}, {@obj_user={'obj_user', 0x3d, "232c9b2f2d"}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@appraise='appraise'}]}}) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x40005, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@subj_role={'subj_role', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r6}}, {@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r7}}, {@uid_gt={'uid>', r8}}, {@audit='audit'}]}}) 16:32:04 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4eb3bfcc8b01004d003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) splice(r2, 0x0, r2, 0x0, 0x10006, 0x0) 16:32:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) sendfile(r0, r0, &(0x7f0000000180), 0x7) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "51d4458d820fb6890351510b4739ea58f2275e718d8ea845d6adb7eb67c20d2fc253362c238c1cbd2bccb3c75f3691371965e9fb793d836ae19b1be96305bd7a6802443174bbaa9a612b09eb94ab08ce568189cdd39b09f212cac91f05be2ca3c3bd4b6fdb68a95cde1c97b8eaf72d76fa717e1e813db7e24727448cc8a37050c306c8f9ff0d1c0237734f38d81fe52586e9474a710dac054a5e9600e730ef0a900a7d92e540d6523e3f93ea8c45059f9c5b5fa14c4152d87a1527c70f930e7f2d9ef755c763feef4e4473286cef91fafd5bb9086776e30cce53225b2afb5fdcc53fa41b490adff9873f3ac0716d15dcd297041b61990a4a044855163ed119170f9920ac6a646ec24412b27cf18135e36885f756e51ca37f834c7484644ab8862c40cd6f371cdcc4c471140676d5e5b0331c83bec79113ac5ff26408b4ae110d7e705926398f58f08e116cc7379f53e81749f894832ad95cc416c4e3646545d185a5633b2b5cf11520650582427f365b586ccaa4d20f9ed7ec26d138d70631a35a37b7a9d939776119231425353facb2acb6ce93468d7533dadd539c618295f680c8b7b120c4ee5950dd953925ef82c5477aefc59bebc2882257991772f936da450cd7c7ebf3600facec438ad21a2226cfdb1918910c68afff8ca0eb6b5e283b3f45f9f41cb8fbf9b2d9c96f5e7802fd72d2f0114b7b141d249b46de44a9d3de50593a3ce8415c45a6942dfb949870da8feff00b6033d24bef6c6f7f1966c8c3743f7126010ce07e6757be5ffd8140db6da7e1fdf2416d2d8239ef96efd319febfa76033a31e422fd81f64c98d60fc6600b6039a7719eaa7b101daea5532ffa5bc5cd77ba339b3ddae15220b1c4fbe37f8e417f0c9d3a2c8c3d7516d4550aff9ae8f98ee30eecccaa4a0ed316e683d4a09443331e75da358fc350c772af2ba15b4f1e7434ff027d65ee4c8e7476951ec7809968a4c2ab6002319fd9bf75292468293e9ca2d4547a1a4b910830fa070314cc42b5905a3d5a736f1780b2d436ae52c98d51925ae0f9f234ec5780a5083af24878f6a02c9bd465748d9b0a04e829307f064d65122cd525db786d2244949703aaffb877e3a19d65bce5c3c8ea3189d788645b86e5e2321906295dc6eaa60c51f2d47d99de519aed18ab3e85b5d5e051a12c22b08d13bf46cbdf9610305afec96c3c3c1ccae6846782d36a39aa7770cff21626dffe6db2fba647dcb6b8a15672ab4b3bd9747b8372923998755d5d5ea77c6534e0da6976639d7ddc7432b00e216324e6080449a2cbc09a8a2df8076bcbb626a6dc03f4d326a68fc43167ddbd15fac866b6d294debed22c72c4d8c3bd692dc45c1e73e40d766299c401b2eadebb24d38bbdacc1c34c876f2e7894043ca69036e04927c04efca4a16ad4adaf6179cfa2c1ca69be1ea7c76ea26fba0470477db39b02ff0220e24ed81ff9f2313ca0df6b500c114aaefaaf7cff9cc5b238e7c1177e67ade4ac6c29e582f56b1c9e779929fd6c4d60e22ad304d003a97e5a00b1921649299decb889afa11605e5ad0d70b230ea61cef5f90b29b3d0bd7e40046d000ab0229f30fdba528ca3c0a8207fbf02dc2a1d232ca9b29e39732334e89a79cdbb4ca77c5208ee782970996b0439159c4458f7ad41a9f296dcd9a5d2ac08a7666f17ec273724b21d33603dce67772bffde286abe7fe33445252751622982e362729a42007fb01102ee37b0bc433baa9cc0f958a0603aeb797e190ca285c7a4b3c68a9a696c1d4b6a7614fc78b4c0f9c34556136d50024d6c241a005efaa08843e7b0dce7240ce445e32904c8dbf0d0e6685dbe5f14627218979513269965ef7c1e34509b54fa9ba7bde993c8d6f53a76a7c89508681b83aaa8672c196f5804facc484d476317172a85850be460a289a84242d50df3614614b9a5fe3f162c03ce17530736f4d171785c08754471faf41577ee61cff4fdd37e1b76e54a8fb8e40a89b21c5f3c22d3106524192f96eb6ef757899e32696aa41d0def5679bcb555484cc17cb6f40d8998b71d34a4ac0834d38339fe709eba082c56ddd7ae8e698d52dfcc961dba263b110bedd8b7e4d4ce1f4be715c57311f9b9884b851f63cf90ef7d9b62df03fda8c7fdb0d90ac3e8fc8acbcac44d253cb7d5887e1c68447af7909f595ae683f69211ad9be7bd64e578eefaba55aba60629671abbfcb221f9c53d04ec31bbd5870c361a4a8ff1d1ce496b39baf623e7ec69ca2051edd07f673c1acfdf88e4050cccfe8f56068d832f0ac6b526065bef2a75c99a3f898c2bee6614bb3154f5e04249660ebbd73adff59763ca389db631944e610511caae3c4312627d25d30e2c2ee35663868373c228d2d166d722fe8a1f27a3140e927330488d853081178aeae31a553303c503773d778622ae9072a00f374d79649b84a909084f93b5c93f6e591c84d01786082e3d6c698cfcffb2c76cc474842f12c1526ea2796be36367de618a132a11a69948895be5487548a489068475a1a38375137b5f5b92a7f20b61e749eb35b63c83df707ac5c8fa07dad9b84bc7490efe11304857eb893ccac56bb70917aedb684ffddc8686365d8ca1e6c1008a5f26ed05b976720ff5c42462313346efdf2ccaa291693a7170d33ce8e64278e1088fa5013e1b62e277920d2a68d37068e29f08658d0cc4ce7269907968526ad0fb21d27090cf61a5982ad3f2b0dd4bfc5aa8da91a366c9ca3b122e4b19afd99bcd9f9ff2dbc7239f29b41e86159149bd282fe30315c9f0dfc8058f1afc30f7c40b3142eb2f8b0b9ee939e5854421778345eeb91d7fad1e803df575ce3d41c7280bb56215b10247e62ba94c2bd59a7d29a89d5eb9bcb15609f30a15ccc2827e9802708b535eadc198a6b52c4cb2029f3b92e6482f7d585ed285911890c56a0390c91d64caed6cc34a925f17b1f114d947a521c6e2f5fe6793d29f024dd75560815333eadc0f9ebbf421993c90af8f88fe3b3831b0feb6014ddaca01499ee918cf5dfb851f1d9909c9dacbc9c0df8864267ce04d19f6a70a5dacdd3db320924a8b14ef513a5f4239c9bab41565f06498851b8b13b43eea2a9b609e4ecbdf1a976c4e48795a08ef718999b3f62347e69e58e1c42d2321e69de8c520100db09b5ad3fcb1ac0ee17bdeac112d0b6f5d4597067fd26c12d0b6fed5d776e0171982828ca5009ce550821f9ba600f3a1ed10a83abe9f39344e83d3bebd4ea7c64b0d4d91284b109f024a46868b1a8500afecd7b19bc7740290c633f4473727dc5bf94008a02e6af1388597e2985ed086e9e1fed3b85f1582f859c650378211df2ec5895d76c7f319419877c3873606d0af61789aa2f9cd33556b7404697a3db5a724053a91cead452c4e01a3e5dcd57330d8d44e859a7f548f886ec2c3e2a693892b4fbd357b017d625e92939a67a2a96a39a9e9568d2f4f06d5d860273755fc3700eef7ac0880dd3ab0ea206f84f08fff15fa768918eb1ac33350e26cd6acec75c0c7a6e896d56b4e84d9157ad24a78e120f44d72f517290bb64a4115a19663c1b816923852530ce2426c96f0ab7990f4558eed258fa2405c1a5c4abdd44c1d51b6ac65da4e92050b7222fd62dbd4bd6784ca75b11b4e2658f31a1e8c0a358131a7a0d2e2dea2a39d9c651d2e2ccc7bfdd37c95f7593bdaae5715c5d81e1d0dc8b10a0a992a74c685304fe20983bde779abef21fac571afda97a27acd9d02c9532df98b1b2e5d2bd117042ab995b6ffb8366fa810e9fe2a9d7b2097350e6daaed34799d6bea556cc152d2f121dba497a85262f4eefc6e077bc9f265329ca58a0edacafd1d41592eedc2d9fa0953d7f58bc00f2a2fddb97f833bfec4ea70ce9f7907e548621e3808a3ccfd3bbe26a78c64e9f7449725b0cc0248e275e2b8857b0b2bbc192cd42f766b458ff4f52b1786d86a3d321d4c0681e70cedcd353f6758bb9bc1cd25aed9ab2fdda3f60ea3f793f3f00f9e2a0771b3eb995ae81d72d99558b268b7276d2a3fa227af2b3b977982c6c8be20b55ef1835a8c623c941e43d5fe805021a6844e9c6cbde2bbd6dbbffa1e60ebc8a9c26eb35a68ef0d30a14a08f4b74d176d0b5473fa111e2d85529db2a63adf95429f30edf2151b4b51e16202e9084f0fc67beb26a0256db8e60595478cdc1831ec817d4db687b31a8333bad36d31afd9ccd215afafe38d79ab397d54eb87756df6ea74ae9a51c7436447197f2990faa0e8dd12d5cd94dfe491bfe3ff684d566ae2d172c781029fb11e54ba20a7b4973cbf9893131a94ec7ced8551efa4a50512a64c23364c33b5a73c5b274e97c761e93aae293142d12d5d4235cf667ea6025ae600b99cde80c000ccab907d64cb96e834ff62b048c4aed5ca67fbcac64cffebac4e8625e5ec78c4dcc1fb3b4aed6ae673085bd3d5c72352d81dbf383b7d6d85a148c49ab6b908a09012f901b0cad6c6173bd76a358d5651d9156ea18dbf3d0e22bb21ad77043faa37bad3df6a570db273f542ce8a572249682e5d5fd6659e46690256897db5eb35c703036e0886e6a15c5157f28e0679bc9e312b247f4c639aaf3e81e047425e5b16be02d072e502809c440655c59e7c80d92b36d1b589391b8ad6f7b050fe2c14f2ff6ad133e1dac255383e342a6403b19cb2fc62731aa986391d901edd0d0a1f19930f60ca6fa22263ff7b00f9263dbf0b0440b30e96f191b6e41dac7d319617ce10c5387e53fe64691e096d69dbbc7e276427f5575c002e1de5cb65092b3a818e4fd2f6e682561cbfdbb4f17b65d17dfff458d3a5881f7832799a42e0b38458924f667ac40d4a83247ae3e4685aaf174497b6fd01b068f0cd88efc2f3807573d4b2bab763f666546b4cead3d5263f6b31a14daaa82877c30175789d5aec83b667bc045be0368734caa79ec3476071b211870d21dee45f8073bb14a26b7d03aa5de83a2febcc63c0a603b27c01656fe3adb460b90b428a552fcd31f86ae0d9de624b3e1fda04990f87760da7d5bea7122a8846e7ad5c13c743c285f4cbdd7e86f5478659a422e466584ecd40026a86a55896e7fae83fdd990cd8ae0562b069a1f614736a440937ea6ed9c9eb315d1637d7b2103d75d4ced145dbd59a6ff99ccad2e194cfa9fe98bfc6b0f8e609f5a82816e03f87abeb94fc68e3020135211d0dc91742e0ab07614a265bbadd141e10c68e51b5d510d6582093de17c265285b7bb2e5052bb898a8adf020493887a2663febc07d70f463e212a2f172d0b05deb1c3d3cdc9898031eeadb6d494e647e4f6bd416f43fd94dbc287d9f32457c400101d50a98bdfca5ba66cc4b254a3fc1cedccfcc99c7df18ca968bd7a13980310f97ae8183db101904fe4a628bcc5f9d2a31fccf9b1475784af201edff7b5dc0f47e253de64f7e93fd70289bc503fb359a1cc8207c05a607cd93a4ea3f048250c59d636b675adffac069ed133e7393df3142dd2ce638f38d14c2b1668a2ad96d7219273293441f50971409841ff00e73bb298ddf5407da5374c1dd66cfd5f30414c1bb265109f75e0df8fbd3e3fb3772e0181219da51879c99283e4408380eba25dee7439a34390f3ac14e9d3b81ae21a682efeada6c87b8b6b693cb955253c233f48fcec753f35a80a1ee67e2fe4691cbdb0086108210a78b416465a03a01e8c6e1ab3a81b84d13d0d0a36173aa902b5755a99bf79a6e65a677efbc0e28daa535a39f7a73fdce457d25e366ab865fbfac3138ec3c2bf387ec0663c30fd6b8d35381fdf11b7b4b0cad059990a136ebd", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00fd90a5f364d7af73fdf1ce4ef7ab68a5b2288d51a673740503fdcc8ac21c2f9f78547021b80e552b6cb77eb28a2835e0447f63f6df08af2e03ca63775b223d82e25f3b5ff61f4e6c9c5e9691ea107fb68e60b16a768fa3d6d21bd17a8ec1ed23bc0893a7cb03d4a08788d34ec2c5a71dbac28838cf8ab94457df321576c43d236b656f2559c41224af8cda6640857cdc11e6837ae308fc5c99d4b3bdd1d7736582e82b62bf61ac3e0876019d164392fb3b85bb6e876d48b7afd5b7c1b71bb851df018e27c93e"]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = dup3(r0, r0, 0x80000) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0xfffffffffffffce4, 0x9, 0x1, {0xc3, 0x101, 0x200000, 0xe37b, 0x53, 0x5, 0x6, 0xff, 0x3f}}, 0x43) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x1f}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0xfffffffffffffe9d, 0x0, 0x2}, 0x10) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) 16:32:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:04 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f690100", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) socket(0x3, 0x2, 0xffffffff) splice(r0, 0x0, r0, 0x0, 0x10005, 0xfffffffffffffffc) 16:32:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465b3f1522cc75fe9070000000c5773656374726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffff, 0x1000, 0x40, 0x2, 0x3b2b, 0xfffffffffffffffb, 0x6, 0x1, 0x4}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x412200, 0x0) sendto$inet(r0, &(0x7f0000000340)="802e94bc832987b2c5afb27b7312003b59a251d080bc498d4e0dc8faf8c32041436223d29f270f69f836ed83a40f7a2eaf1d6b6e037caddd080cad615dd2c9cea5439a5c143f0dcaf7245c130d69ec4dccb2196f49d1bf37421c90103b0adaa357eb8e0da16bd675f2133f1edf6882b54077426a897c920c283ff72e31979eb0f102198da027718fa4ff9c7a56e769849cc9cc4c4c921c37aca10360125d018d0e08d39eae615169965b1e1e3514b7080e9dad36d5c002a12640dadf30fd47ce6c6f9062e324195f33b1a784a8d34aa9a2f4fd19ff58d0954ea2f5d980f8ccc0d7d6c1bc08", 0xe5, 0x408c4, &(0x7f0000000140)={0x2, 0x2, @broadcast}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="331635a142e08063", @ANYRESDEC=0x0, @ANYBLOB="0600"]) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x20) ppoll(&(0x7f00000000c0)=[{r0, 0x8011}, {r0, 0x400}, {r0, 0x1004}, {r0, 0x2}], 0x4, &(0x7f0000000100), &(0x7f0000000180)={0x3ac8}, 0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x794000000}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:04 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='C\\', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:04 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:04 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ftruncate(r1, 0x100000000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',0000000000000000040000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x455, 0x0, 0x5}, 0x10) 16:32:04 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x1, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x4) 16:32:04 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000300)="854815622474b7c96a8801001d7cb3fdd746ffe286c89401281cd935d3ee3d4b4c49243d1bd41b66da146ad3792fa0ae0ba9f0279d00090e0921bc2f086fd9244eb2145335d1a3bc8a98853d85d3992e8f453e09b0395e43e802043414e56b78fe980eb09064c30608213fa865803e41a5a7c0759cc9c3b6a7b91c44597fffcd9d638b945705685b87745f677c9ab2cca5795b33afce77e01679a0f2d6829bf2032de5606605bafa2a2d36a110829925f77d0d0e2aad5d1425", &(0x7f0000000480)="e9b9288a4462a22984576b"}, 0x20) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x400, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000200)={0x8001, 0x9, 0x1, r3}) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) rt_sigsuspend(&(0x7f00000000c0)={0x54}, 0x8) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00') splice(r0, 0x0, r0, 0x0, 0x10005, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x7ff, 0x6, 0x80000001, 0x8, 0x3, 0x3e, 0x800, 0x12e, 0x40, 0x116, 0x5, 0x0, 0x38, 0x2, 0x2, 0x100, 0x1}, [{0x3, 0xffffffffffffffff, 0x9, 0x100000000, 0x200, 0x1, 0xfffffffffffffffd, 0x3ff}, {0x7, 0x7, 0x46b5, 0xaa, 0x62b7, 0x4, 0x6, 0x4}], "341455c4189368474a648047e598435ec05fe1552d836503b18292dc7d5f816e33c9a56b63e936480bde995cc89d7f42fb1bc2bacde10624f5a639659aa20967f6a3c73664a7eebc27b9d2ebd1", [[], [], [], [], [], [], [], [], [], []]}, 0xafd) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000280)={0x4, 0xd, 0x9, 0x4}) 16:32:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'syzkaller1\x00', 0x400}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000d00)={0x4, 0x5b, {0x57, 0x4, 0x7fffffff, {0x200, 0xa98}, {0x7, 0x5}, @period={0x5f, 0x401, 0x1ff, 0x4, 0xfffffffffffffff7, {0x5, 0x7ff, 0x94, 0x5}, 0x1, &(0x7f0000000cc0)=[0x7]}}, {0x57, 0x2, 0x400, {0xffff, 0x80}, {0x9f, 0x9}, @const={0x0, {0x5, 0x1f, 0x80000001, 0x8}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000840)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000940)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000a40)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00)=0x0, &(0x7f0000000b40), &(0x7f0000000b80)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xe64, 0x6, &(0x7f0000000780)=[{&(0x7f0000000340)="9b050d7383d21a2cce6c2e149d48fdda66fdab7ddeac6514c26e3117cf33830755fafc124ae8faae5a0c173f6851288450032bef1cecf297ca5dd7e832ea505c3e99d160a010cf747c369f7dff110d41d716b7e24043d0ba1509918fac3b45447cc353f7c3394c064bbedc908373b76f703735745b1c8cf5119f6af55d900895cf0b5807f6d2a924dcbff1a2cb0f2f9e0d73ca805bcd8d220b1274a4bca8ad308dc1ddacfa920ca9eb04f6423964a0cafd9f0f2f5ebb97874bde1b7534f6673e7b7e6d7da22e2b02", 0xc8, 0x7}, {&(0x7f0000000440)="6321b4f35eddf29b7ba3680fc5eb13b5709bed793ae08ff9e3d3dab75eea6af1a85911c17f5843650d4e4ea4d68c0e7dd80bc477e527f5bcbcf532cd5b27398d4f72237290fee1254fe09a75a4505d2d3bbcd2869c5087b2795a226dc8a3363c4a714401eb0d98ba452eed3bbaf326b1c6062296bd8ce9341f379c9ef96badfdb848c529a6b68e4646ddf1", 0x8b, 0x1ff}, {&(0x7f0000000500)="c6cab85dedd514a550e90f00e43535e5bf741f0aee6507cc5540030543ffb2c028d7bc6bf65b4ff593a72c3163685e23ec25ca320bad6a11e08bbba79fb1d53117dd3db083c9770261a4c4f5e245e386f54063da570d6c4cdbda7cc26129def53db2c4bf4809deba98d4b6649b0820e9d167d97637e1a13288b7077c867ee46fc13fe3169021ddcdaa68f57bab146323dde2cf4c209da5c589a549c4c2730d4131e7d3a4b1a6dafe57", 0xa9, 0x6}, {&(0x7f00000005c0)="2401bb6c88faa741459e246f9014f73abb9d65a0fd27a13940bc292eb418494848e14b299b7832a69f7a6c9d25fb32afeb6b4a1143723689bb56dd1c38386857addc740eea21527a34db627599bd5639ad78d1bb14b20c06a5603a56092a5925887230cc1f5b072b74836c1756df32482fa86ece65fb7c4635a7698755472aa1dd14c95435543338277df7886ffc39bfc4fdf43fae414ce711f198fc7fb568b8715badf8c58d5b06ae9ce90872a698db492f8c6a2515eafcd04f91ec33985f5250593fb9d0e774d41829dd4b34a66028e0a310fd53f6d244fd97e7a68af94864ca8ecd0522a395818a531626096df1", 0xef}, {&(0x7f00000001c0)="93e7feee4614c162833d9fec7e5aef8fc150324da68ce0d08ae892522cbe755ebac1c97e29", 0x25, 0x2}, {&(0x7f00000006c0)="38e0436636672454719ac9a2928429d8da2ffd75309091096c15f737bdb2072fd0575f92160d15c9d3b627fcb04e7fa39831041deeada26e69b2e8bc30e6378e9d209cae28b156038e7513dcb0f5760f25a92742c9cfcfaac0b7889be01d55c863b4fc523637395c58308e78dde82ec748e98bd2f22ca3d47ab0d13426df7552433a1ca04a64248d95c5a9275e2e8229b89aceda32abefbe9dce3ea78b584f69397bcf2ce2403cd354d5ebe659", 0xad, 0x8001}], 0x81, &(0x7f0000000bc0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}], [{@obj_type={'obj_type', 0x3d, 'selinux\''}}, {@uid_gt={'uid>', r3}}, {@uid_lt={'uid<', r4}}, {@fowner_gt={'fowner>', r5}}, {@smackfsroot={'smackfsroot', 0x3d, '/]'}}, {@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute'}}, {@uid_gt={'uid>', r6}}, {@fsname={'fsname', 0x3d, 'fd'}}, {@obj_role={'obj_role', 0x3d, 'rootmode'}}]}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file0\x00', 0xa0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000240)) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='trusted.sGcurity.evm\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept4(r1, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x80, 0x80800) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000080), &(0x7f00000001c0)=0x6e, 0x80000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c04c73d16ddec715c719f08be00"]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) quotactl(0x5, &(0x7f0000000280)='./file0\x00', r3, &(0x7f0000000440)="0c4118da1735c311bf8bc3bbf3f00ff65d7b7e287cf9857fe76d27b2754f6d3fcf360f99bc7e73017fa50cbddf1afbe420e14ed1b1f0363653ea7a71b651401d6f6d52fb59f738383d40f2bc61cea08d1a454f2e5dd5d950f88cee9471b833d09e0fa562f567aa0715dafcf453d3f67ba0f9c3f6c65c1d1abfa5d552ef145d8e8e8e4483647334f2ad83ad7340d7e822") ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200, 0x2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) accept$unix(r0, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x46, 0x1, 0x0, 0x4, 0x14, 0x8, "2c9bf8ff92ce4db45a242d2fe8cc317c86de99915b1ab0ac6e358510b1b9cae9f1e0989d0f29e7f9ad2555e2f39acc0a5e868094356074258dfcc829aa904747", "d9710d20553fe5da44955e062dcfdbf572c9ac8c56eb87a13279ef94893e7e0285ae2bd8b6726b7f13c78993429191afe8ef7e477c259662539f99d0852f877e", "ef119bd6c718d95b17e55c0a9a67ce9f11c5ecd140dff285c35ad318e7cc19a3", [0x3b, 0x4]}) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000002e00020027bd7000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="f1ff0200f3ff060036330eb9ed050051ac70a7a01c869122c8e200c6e16bc17073ff0008"], 0x3c}}, 0x80) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000380)=0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/keychord\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x8, 0x80000001, 0xffffffffffffff31, 0xee24, 0x0, 0x5, 0x8, 0x0, 0x2f5, 0xdd6f, 0x4, 0xffffffffffffff81, 0x6, 0x3, 0x22a3c65e, 0xfffffffffffffff7, 0xfffffffffffffff7, 0x8, 0xfff, 0x6, 0x6e, 0xfff, 0xea, 0x5, 0x7, 0x1, 0x7, 0x4, 0x3, 0x39, 0xfffffffffffffffc, 0xc37, 0x0, 0x3, 0x52, 0x40, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000600), 0x1}, 0x4001, 0x2, 0x0, 0x7, 0x401, 0x3, 0x4}, r1, 0x5, r2, 0x8) ptrace$setopts(0x4200, r1, 0x2, 0x4) pause() read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000000c0), 0x4) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000100)={0x4, 0x10, 0xc78707b08de7c92f, r3}) shutdown(r3, 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000480)="58616cfa472617e8de556a54a17a718ca1114088f0b315c7d773a46a8af12d5e392ad3bcb2b12ac78812e188bedcaade2716031998b7dac624a8716b261bd78595e2cf1a110fe470a0cac189fc8106bb39375d1437dc905f0705c4cb3fd91ccc2c19bb5353bfe6143bdb7c61d2a4e3fdf41b0bdb8a062d104d6e9b0a492fbf656507db450e80d7522e9ca66814f411bc", 0x90, 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000540)="f5c2595ec63848be958b5b31cad198109ececa2b593025d75841b64dea09d1a92073f73153490ae652cac49372842ac7a9976517520be40cf01320e97e5eb45c9654ed4efdb2d22cdd3f68feb9d19882e3cff8e338727c76a82f2dc866d1e66b141bda8c4ed2e8303d52df92f91c09bc15603a27907b640544b3ddc10b480eabe66dd67cdbb2e32ba1ba71084219f2af1bd215d59e7e527c6989bff9269124ed", 0xa0, 0xffffffffffffffff) keyctl$link(0x8, r4, r5) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000700)={'ipvs\x00'}, &(0x7f0000000740)=0x1e) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) clone(0x100, &(0x7f0000000200)="02e811dcf09ddf67eaaa0d99e7a397cdd71986a85148f4406aba908747e1d799de317924fe9c16778668e519bc98f4415b8ed55a002ec99ad5c99b3a290bc729a446b694277e2e9481b3dc233ddc0848540476cd10e06a7f3d5250fad199d81897520c4034bfd1284fafe47d5f611d5a980dc8aa834e2f9d280c207ce94b335f68e061da5f2e2a06b2307d8332a66fff47fa7edc02121362d4b3dcd79a6a3b4df43d8564938e7af62ece0b91c87687067f4461366b779eda775b8a18db1090b64bf6d3886e7d94471b5ff60404011a7561a7d377cd2f7a1423c485", &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000480)="2b4e85a2b1be694b2686b665889e5a77ae115dec07b723e160f19806bec42df49ccc5a7abd9b8c44e545f2c9760477ab8a75e602ab3e948bcf8f5d3526394a0b41dc1d8374db0b10700933e4f86999e5ef099e31a2b0273eac67ac657db378fdf18991a0be788aebd757acfa758802e67710e2152bb9683e1337423dd4a75297ec2bd7929e8b6e2b6d610e588d7964dbed37d99414828196cf6c6aa6059730a814dd65a8dd98c5f4db4b7786eb0fa4f7728c90eeb4c56eaf838e426306ac8a78fba49352") mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) getresuid(&(0x7f0000000680)=0x0, &(0x7f00000006c0)=0x0, &(0x7f0000000700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000840)=0xe8) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f0000000c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) r9 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) fstat(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000b40)={{}, {0x1, 0x6}, [{0x2, 0x4, r1}, {0x2, 0x2, r2}, {0x2, 0x5, r4}, {0x2, 0x6, r5}, {0x2, 0x2, r6}, {0x2, 0x4, r7}, {0x2, 0x1, r8}], {0x4, 0x6}, [{0x8, 0x4, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x7, r12}], {0x10, 0x1}, {0x20, 0xfffffffffffffffc}}, 0x7c, 0x2) syz_mount_image$f2fs(&(0x7f00000008c0)='f2fs\x00', &(0x7f0000000bc0)='./file0/file0\x00', 0xffffffff, 0x4, &(0x7f0000000d40)=[{&(0x7f0000000c00)="213c2634075ddb15c1ef06747abb3759f36c6da769f16992960217e177851dc957c6b24425d8da6243af60d423451434a2ad9b9881fd9350e2f7971650eb", 0x3e, 0x7}, {&(0x7f0000000c80)="e5360ec9eff0f6bb2985ef74940632e5de1ad6fda45791c5f35fc89e779041e846b52aa097092819fddf16cf943863c89f85114ebc0729c7c39684d876275dc405082325ad53ead8a705e88f6a2037090289c016fb6478a70bdf6303bd59b668bbd972eba8880dc3033fecf91fd2db9ec184f4ef", 0x74, 0x9}, {&(0x7f0000003000)="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", 0x1000, 0x40}, {&(0x7f0000000d00)="374490c9f3445d9d9634d92d40362bb833950864e73d336cb2a7", 0x1a, 0x10000}], 0x0, &(0x7f0000000dc0)={[{@six_active_logs='active_logs=6'}, {@noquota='noquota'}, {@test_dummy_encryption='test_dummy_encryption'}], [{@euid_gt={'euid>', r3}}, {@euid_eq={'euid', 0x3d, r6}}, {@hash='hash'}]}) keyctl$session_to_parent(0x12) read$FUSE(r0, &(0x7f0000002000), 0x120f) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000e40)='cgroup.stat\x00', 0x0, 0x0) recvmsg(r13, &(0x7f0000001600)={&(0x7f0000000e80)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001080)=""/118, 0x76}, {&(0x7f0000001100)=""/70, 0x46}, {&(0x7f0000001180)=""/180, 0xb4}, {&(0x7f0000001240)=""/195, 0xc3}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/35, 0x23}, {&(0x7f0000001340)=""/125, 0x7d}, {&(0x7f00000013c0)=""/91, 0x5b}, {&(0x7f0000001440)=""/230, 0xe6}], 0x9, &(0x7f0000006000)=""/4096, 0x1000, 0x7ff}, 0x2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x7fff, 0x0, 0x800000000}}, 0xfffffffffffffe35) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000002c0)='y\x00', 0xffffffffffffffff}, 0x30) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000440)={0x100000001, 0x4268, 0x1, 0x5, 0x1f, 0x5}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000004c0)='./file0\x00', 0x82) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local, @dev={0xfe, 0x80, [], 0x17}, @ipv4={[], [], @empty}, 0x8000, 0x8, 0xffff, 0x100, 0x7, 0x20000, r4}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0xfffffffffffffffc, 0x1, {0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe}}, 0xffffffffffffff95) epoll_wait(r2, &(0x7f0000000480)=[{}], 0x1, 0x401) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) 16:32:05 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000100)=r2) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffde1, 0x0, 0x8, {0x0, 0xa445a45996efa22e}}, 0x20) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:05 executing program 4: link(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0/file0\x00') r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x1, 0x0) recvfrom$inet(r0, &(0x7f0000000340)=""/189, 0xbd, 0x40, &(0x7f0000000400)={0x2, 0x4e22, @loopback}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x54, "d7fb8ce4dbc708a8ff001237102d05eef4f69d39b15160eab15e11c271fe5fb3b82abffdfc2348cfae39d6b5cb0b2fb878e109f11b600d13dbcf8b725ac29ee917e081d64199c88e0121c9235f4a26137c35602e"}, &(0x7f00000001c0)=0x78) 16:32:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643da902cdcb96ba1933441be06d2f2cef5e6ed181399b97992a790864ade5ada2783b34de41f2b46f433eb0b484489fb4b19773fd7c26fca2e780543c14772b330f91dde9c8b6d943081533c47969276ca2d1f1c954ef931b8bae0ffdd586e5d20f91d3da0a2fa9588261a3389e1a646e71dfd565a993b20b1edc3e8e6a4647ff23be0293cc1e722ceb58dd7be15d6544063d99556989c9f338a51b872c66fc37d383377580134a8fce306ff686acac76209714e4792590fc4b01c379874637", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000003000), 0xfffffffffffffd51) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x7}, 0x10) 16:32:05 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) splice(r1, 0x0, r1, 0x0, 0x20001000b, 0x0) 16:32:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7472753334e80df57465642e73656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000540)=0xc) r3 = getuid() r4 = getegid() sendmsg$unix(r1, &(0x7f00000005c0)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000340)="32571c7ea46c9337916fbec0753886ee54b73d64d39e23278de800e46a84d95a54b366a76568b6028c1b36fb7217f7e4318b88a4bddf2b73288cb26a745ed44bcc34fe61dc7bf7ce64a1d3c53c99007d8b50c6762447dd219298a1b8d40ed19e71d1a0f899", 0x65}, {&(0x7f0000000480)="2e2aecffec10bdd98c06cbd1a07f26465847c16001fc3ca9a14aac1b12d6edfab791f30e66c65d091fa8b5b8ab79e5fefbf24eda6ad5425d129b93971489d95b292ea607fe32b48cad1992e67c03b91d60402a7809afefa8161bae760c64dba82d3c40c454daac74c73b0a9b19c25acd1ef76c0b3b95455b06526ecc05905d16c6cbe993c482f16cf9fc4ea9c204cb9f2f5da334632f3415016a2ced9c0429bbe097a47b71483ac1f5a8db5dc4a6564761fd", 0xb2}], 0x2, &(0x7f0000000580)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x38}, 0x4000001) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffe, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r2, @ANYPTR64, @ANYBLOB="bd21717810194209f67a157a4a964f", @ANYRES16=r0, @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0]]) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x7b94774eab49b6d1, 0x0, 0x0, {0x0, 0xfffffffffffffffe}}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getegid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)) setxattr$system_posix_acl(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000140)="73797374656d2e706f7369785f61636c5f64656661756c7410", &(0x7f0000000780)={{}, {0x1, 0x7}, [], {0x4, 0x5}, [], {0x10, 0x2}, {0x20, 0x5}}, 0xfd32, 0x2) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c51726ff7ffffff6c3dfb7db9e5f71883392fb106ac48089bd7bda049af7793c958fe5de5ada4411c98dad445dc9637b28554c4c3676bec3fabf5a2d7d8efcce78879c9902712c7686c1a8480", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="06ffdd639c2eb3c7feab8c5f04", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='ext3\x00', 0x100000, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = memfd_create(&(0x7f0000000240)='/dev/fuse\x00', 0x2) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xc00}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions='default_permissions'}]}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="747275737409767d000a0bba9be2ca94656c4e8f2805e28db10d27c5a2442100ac259a84aae752946b78b64d229f828c250253b56c80e851fe3164b28a9f912b8e70346269448a74e5ca2fd7adf58fd8dc169043184b7246600d013bf57b2c1af7faf7914e3f3bbd16686d62d5c8ae341a34a7b307720aba544d91b5530e0d9bae2099ba843f26d35ae6d9a72da0151e1b2a0ece6164ce"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x50, 0x28, &(0x7f0000000200)=[@flat={0x0, 0x10a, r2, 0x1}, @fda={0x66646185, 0x1, 0x2, 0x2f}, @flat={0x776a2a85, 0x0, r3, 0x2}], &(0x7f0000000180)=[0x38, 0x40, 0x20, 0x30, 0x58]}}], 0x18, 0x0, &(0x7f0000000400)="19e40bb56bda46068eb7e894a82e0f70951c31e45ca8bcb6"}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r4 = geteuid() ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000800)={0x1, 0x94, "eb5e6968d55a1bb7d1b4406c2b46d9672e2373e2230336d302a870a32e56d9fcce46b4346ba9bf0840e8dfe29446e448ca3ec61c46d807896d42bc4fb8ca5c9721c4bf558c39cc3685199178a37af69c0ef6ec5872a09a78f60554b7eec53a509fa51b725e81c6fc7d9ca33b5a573601905d86451061cbb1b9dca29eb5d9d1d9d5d4af970985013d675bf6c4adefc3d3f39de03f"}) r5 = getegid() mount$fuseblk(&(0x7f0000000540)='/dev/loop0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='fuseblk\x00', 0x820080, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}]}}) 16:32:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "51d4458d820fb6890351510b4739ea58f2275e718d8ea845d6adb7eb67c20d2fc253362c238c1cbd2bccb3c75f3691371965e9fb793d836ae19b1be96305bd7a6802443174bbaa9a612b09eb94ab08ce568189cdd39b09f212cac91f05be2ca3c3bd4b6fdb68a95cde1c97b8eaf72d76fa717e1e813db7e24727448cc8a37050c306c8f9ff0d1c0237734f38d81fe52586e9474a710dac054a5e9600e730ef0a900a7d92e540d6523e3f93ea8c45059f9c5b5fa14c4152d87a1527c70f930e7f2d9ef755c763feef4e4473286cef91fafd5bb9086776e30cce53225b2afb5fdcc53fa41b490adff9873f3ac0716d15dcd297041b61990a4a044855163ed119170f9920ac6a646ec24412b27cf18135e36885f756e51ca37f834c7484644ab8862c40cd6f371cdcc4c471140676d5e5b0331c83bec79113ac5ff26408b4ae110d7e705926398f58f08e116cc7379f53e81749f894832ad95cc416c4e3646545d185a5633b2b5cf11520650582427f365b586ccaa4d20f9ed7ec26d138d70631a35a37b7a9d939776119231425353facb2acb6ce93468d7533dadd539c618295f680c8b7b120c4ee5950dd953925ef82c5477aefc59bebc2882257991772f936da450cd7c7ebf3600facec438ad21a2226cfdb1918910c68afff8ca0eb6b5e283b3f45f9f41cb8fbf9b2d9c96f5e7802fd72d2f0114b7b141d249b46de44a9d3de50593a3ce8415c45a6942dfb949870da8feff00b6033d24bef6c6f7f1966c8c3743f7126010ce07e6757be5ffd8140db6da7e1fdf2416d2d8239ef96efd319febfa76033a31e422fd81f64c98d60fc6600b6039a7719eaa7b101daea5532ffa5bc5cd77ba339b3ddae15220b1c4fbe37f8e417f0c9d3a2c8c3d7516d4550aff9ae8f98ee30eecccaa4a0ed316e683d4a09443331e75da358fc350c772af2ba15b4f1e7434ff027d65ee4c8e7476951ec7809968a4c2ab6002319fd9bf75292468293e9ca2d4547a1a4b910830fa070314cc42b5905a3d5a736f1780b2d436ae52c98d51925ae0f9f234ec5780a5083af24878f6a02c9bd465748d9b0a04e829307f064d65122cd525db786d2244949703aaffb877e3a19d65bce5c3c8ea3189d788645b86e5e2321906295dc6eaa60c51f2d47d99de519aed18ab3e85b5d5e051a12c22b08d13bf46cbdf9610305afec96c3c3c1ccae6846782d36a39aa7770cff21626dffe6db2fba647dcb6b8a15672ab4b3bd9747b8372923998755d5d5ea77c6534e0da6976639d7ddc7432b00e216324e6080449a2cbc09a8a2df8076bcbb626a6dc03f4d326a68fc43167ddbd15fac866b6d294debed22c72c4d8c3bd692dc45c1e73e40d766299c401b2eadebb24d38bbdacc1c34c876f2e7894043ca69036e04927c04efca4a16ad4adaf6179cfa2c1ca69be1ea7c76ea26fba0470477db39b02ff0220e24ed81ff9f2313ca0df6b500c114aaefaaf7cff9cc5b238e7c1177e67ade4ac6c29e582f56b1c9e779929fd6c4d60e22ad304d003a97e5a00b1921649299decb889afa11605e5ad0d70b230ea61cef5f90b29b3d0bd7e40046d000ab0229f30fdba528ca3c0a8207fbf02dc2a1d232ca9b29e39732334e89a79cdbb4ca77c5208ee782970996b0439159c4458f7ad41a9f296dcd9a5d2ac08a7666f17ec273724b21d33603dce67772bffde286abe7fe33445252751622982e362729a42007fb01102ee37b0bc433baa9cc0f958a0603aeb797e190ca285c7a4b3c68a9a696c1d4b6a7614fc78b4c0f9c34556136d50024d6c241a005efaa08843e7b0dce7240ce445e32904c8dbf0d0e6685dbe5f14627218979513269965ef7c1e34509b54fa9ba7bde993c8d6f53a76a7c89508681b83aaa8672c196f5804facc484d476317172a85850be460a289a84242d50df3614614b9a5fe3f162c03ce17530736f4d171785c08754471faf41577ee61cff4fdd37e1b76e54a8fb8e40a89b21c5f3c22d3106524192f96eb6ef757899e32696aa41d0def5679bcb555484cc17cb6f40d8998b71d34a4ac0834d38339fe709eba082c56ddd7ae8e698d52dfcc961dba263b110bedd8b7e4d4ce1f4be715c57311f9b9884b851f63cf90ef7d9b62df03fda8c7fdb0d90ac3e8fc8acbcac44d253cb7d5887e1c68447af7909f595ae683f69211ad9be7bd64e578eefaba55aba60629671abbfcb221f9c53d04ec31bbd5870c361a4a8ff1d1ce496b39baf623e7ec69ca2051edd07f673c1acfdf88e4050cccfe8f56068d832f0ac6b526065bef2a75c99a3f898c2bee6614bb3154f5e04249660ebbd73adff59763ca389db631944e610511caae3c4312627d25d30e2c2ee35663868373c228d2d166d722fe8a1f27a3140e927330488d853081178aeae31a553303c503773d778622ae9072a00f374d79649b84a909084f93b5c93f6e591c84d01786082e3d6c698cfcffb2c76cc474842f12c1526ea2796be36367de618a132a11a69948895be5487548a489068475a1a38375137b5f5b92a7f20b61e749eb35b63c83df707ac5c8fa07dad9b84bc7490efe11304857eb893ccac56bb70917aedb684ffddc8686365d8ca1e6c1008a5f26ed05b976720ff5c42462313346efdf2ccaa291693a7170d33ce8e64278e1088fa5013e1b62e277920d2a68d37068e29f08658d0cc4ce7269907968526ad0fb21d27090cf61a5982ad3f2b0dd4bfc5aa8da91a366c9ca3b122e4b19afd99bcd9f9ff2dbc7239f29b41e86159149bd282fe30315c9f0dfc8058f1afc30f7c40b3142eb2f8b0b9ee939e5854421778345eeb91d7fad1e803df575ce3d41c7280bb56215b10247e62ba94c2bd59a7d29a89d5eb9bcb15609f30a15ccc2827e9802708b535eadc198a6b52c4cb2029f3b92e6482f7d585ed285911890c56a0390c91d64caed6cc34a925f17b1f114d947a521c6e2f5fe6793d29f024dd75560815333eadc0f9ebbf421993c90af8f88fe3b3831b0feb6014ddaca01499ee918cf5dfb851f1d9909c9dacbc9c0df8864267ce04d19f6a70a5dacdd3db320924a8b14ef513a5f4239c9bab41565f06498851b8b13b43eea2a9b609e4ecbdf1a976c4e48795a08ef718999b3f62347e69e58e1c42d2321e69de8c520100db09b5ad3fcb1ac0ee17bdeac112d0b6f5d4597067fd26c12d0b6fed5d776e0171982828ca5009ce550821f9ba600f3a1ed10a83abe9f39344e83d3bebd4ea7c64b0d4d91284b109f024a46868b1a8500afecd7b19bc7740290c633f4473727dc5bf94008a02e6af1388597e2985ed086e9e1fed3b85f1582f859c650378211df2ec5895d76c7f319419877c3873606d0af61789aa2f9cd33556b7404697a3db5a724053a91cead452c4e01a3e5dcd57330d8d44e859a7f548f886ec2c3e2a693892b4fbd357b017d625e92939a67a2a96a39a9e9568d2f4f06d5d860273755fc3700eef7ac0880dd3ab0ea206f84f08fff15fa768918eb1ac33350e26cd6acec75c0c7a6e896d56b4e84d9157ad24a78e120f44d72f517290bb64a4115a19663c1b816923852530ce2426c96f0ab7990f4558eed258fa2405c1a5c4abdd44c1d51b6ac65da4e92050b7222fd62dbd4bd6784ca75b11b4e2658f31a1e8c0a358131a7a0d2e2dea2a39d9c651d2e2ccc7bfdd37c95f7593bdaae5715c5d81e1d0dc8b10a0a992a74c685304fe20983bde779abef21fac571afda97a27acd9d02c9532df98b1b2e5d2bd117042ab995b6ffb8366fa810e9fe2a9d7b2097350e6daaed34799d6bea556cc152d2f121dba497a85262f4eefc6e077bc9f265329ca58a0edacafd1d41592eedc2d9fa0953d7f58bc00f2a2fddb97f833bfec4ea70ce9f7907e548621e3808a3ccfd3bbe26a78c64e9f7449725b0cc0248e275e2b8857b0b2bbc192cd42f766b458ff4f52b1786d86a3d321d4c0681e70cedcd353f6758bb9bc1cd25aed9ab2fdda3f60ea3f793f3f00f9e2a0771b3eb995ae81d72d99558b268b7276d2a3fa227af2b3b977982c6c8be20b55ef1835a8c623c941e43d5fe805021a6844e9c6cbde2bbd6dbbffa1e60ebc8a9c26eb35a68ef0d30a14a08f4b74d176d0b5473fa111e2d85529db2a63adf95429f30edf2151b4b51e16202e9084f0fc67beb26a0256db8e60595478cdc1831ec817d4db687b31a8333bad36d31afd9ccd215afafe38d79ab397d54eb87756df6ea74ae9a51c7436447197f2990faa0e8dd12d5cd94dfe491bfe3ff684d566ae2d172c781029fb11e54ba20a7b4973cbf9893131a94ec7ced8551efa4a50512a64c23364c33b5a73c5b274e97c761e93aae293142d12d5d4235cf667ea6025ae600b99cde80c000ccab907d64cb96e834ff62b048c4aed5ca67fbcac64cffebac4e8625e5ec78c4dcc1fb3b4aed6ae673085bd3d5c72352d81dbf383b7d6d85a148c49ab6b908a09012f901b0cad6c6173bd76a358d5651d9156ea18dbf3d0e22bb21ad77043faa37bad3df6a570db273f542ce8a572249682e5d5fd6659e46690256897db5eb35c703036e0886e6a15c5157f28e0679bc9e312b247f4c639aaf3e81e047425e5b16be02d072e502809c440655c59e7c80d92b36d1b589391b8ad6f7b050fe2c14f2ff6ad133e1dac255383e342a6403b19cb2fc62731aa986391d901edd0d0a1f19930f60ca6fa22263ff7b00f9263dbf0b0440b30e96f191b6e41dac7d319617ce10c5387e53fe64691e096d69dbbc7e276427f5575c002e1de5cb65092b3a818e4fd2f6e682561cbfdbb4f17b65d17dfff458d3a5881f7832799a42e0b38458924f667ac40d4a83247ae3e4685aaf174497b6fd01b068f0cd88efc2f3807573d4b2bab763f666546b4cead3d5263f6b31a14daaa82877c30175789d5aec83b667bc045be0368734caa79ec3476071b211870d21dee45f8073bb14a26b7d03aa5de83a2febcc63c0a603b27c01656fe3adb460b90b428a552fcd31f86ae0d9de624b3e1fda04990f87760da7d5bea7122a8846e7ad5c13c743c285f4cbdd7e86f5478659a422e466584ecd40026a86a55896e7fae83fdd990cd8ae0562b069a1f614736a440937ea6ed9c9eb315d1637d7b2103d75d4ced145dbd59a6ff99ccad2e194cfa9fe98bfc6b0f8e609f5a82816e03f87abeb94fc68e3020135211d0dc91742e0ab07614a265bbadd141e10c68e51b5d510d6582093de17c265285b7bb2e5052bb898a8adf020493887a2663febc07d70f463e212a2f172d0b05deb1c3d3cdc9898031eeadb6d494e647e4f6bd416f43fd94dbc287d9f32457c400101d50a98bdfca5ba66cc4b254a3fc1cedccfcc99c7df18ca968bd7a13980310f97ae8183db101904fe4a628bcc5f9d2a31fccf9b1475784af201edff7b5dc0f47e253de64f7e93fd70289bc503fb359a1cc8207c05a607cd93a4ea3f048250c59d636b675adffac069ed133e7393df3142dd2ce638f38d14c2b1668a2ad96d7219273293441f50971409841ff00e73bb298ddf5407da5374c1dd66cfd5f30414c1bb265109f75e0df8fbd3e3fb3772e0181219da51879c99283e4408380eba25dee7439a34390f3ac14e9d3b81ae21a682efeada6c87b8b6b693cb955253c233f48fcec753f35a80a1ee67e2fe4691cbdb0086108210a78b416465a03a01e8c6e1ab3a81b84d13d0d0a36173aa902b5755a99bf79a6e65a677efbc0e28daa535a39f7a73fdce457d25e366ab865fbfac3138ec3c2bf387ec0663c30fd6b8d35381fdf11b7b4b0cad059990a136ebd", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x100000000000000}}, 0x20) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:32:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou0_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r2, &(0x7f0000000480)="9a66e0288c15ee80765b6127c86116a9c4e08f7e1f9f714c9ce0fe19de20c142ee6f81c986056397e35beca92eebe37b1a76b17d1c6aa5fc384f471efd28d88bb637861a68e7aafaa4d906b9e568b9e27095a3df7d1f44be9195255feffa92d79524cac797f660612fef5ac3af375caad4b224333277d55c4fb1b82d4fa507574ac5edf29a478fbc", &(0x7f0000000100)=""/19}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 4: utime(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000340)={0x1, 0x8}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000400)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r3 = geteuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x400, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)=@random={'osx.', 'rootmode'}, &(0x7f00000001c0)=""/34, 0x22) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000380)=0x40) 16:32:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="747275737465642e73656375726974792e65766d002df5b28de4b30850429d45726d6baf3b0006ce1cdfa72af97d4a63fa7c5549afc6f453be69f19cb47161e7c18b3fbf864c6d2882964954992695680b618df04ca1a3dcaf2ffc95c13f5a072e3f0b7cfa"], &(0x7f0000000f80)=""/210, 0xd2) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x7, {0x1, 0x2, 0x3ff, 0x1f, 0x9, 0x3f, {0x5, 0x9b, 0x2, 0x80, 0x6, 0x5, 0x80, 0xa38, 0x3, 0xddf2, 0x7, r1, r2, 0x4}}}, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 2: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000400)={0x8, 0x4, 0x1, 0x80000001, 0x2, [{0x3a1c0000000000, 0x1, 0x1}, {0x4, 0x8, 0x40000, 0x0, 0x0, 0x404}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e9f08e388dcbbd9f9a3ec56622bd576c03"]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465574773656375726974972e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000100)={0xfffffffffffff6b7, 0x1ff, 0x8}, 0xc) 16:32:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000340)="9d7746cfa7217f4858196f4106f75d84bbf392b1a7b2f80cc5c8516f78255032273587c516edf03c7092245f89e883e88f6f554625fc33321ccbb351114f255baf9cc3056b81354601cf6477a005d3d776f0a57059d485718e4880621bccafa1b369b42f0ae70184836fb3a3e02f2186e4a72aabda477ab66fff8e0ad28c18d18f39a25a3f2d2e94aa0c02b5ef5c6fe1afd7eebc661d8f5667f06fa65d56180867") r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r0, 0x0, 0x10005, 0x0) 16:32:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = dup(r0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0x9, 0x6, 0x5, 0x1, 0x2, 0xfffffffffffffffb, 0x4, 0x4, 0x2, 0x5, 0xfcb}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x1f, 0x2a, &(0x7f00000000c0)="7d624226683c881af2bc6bb91e24e4a5c0dbb1019086f092d9935d478e8157bf0a2802c45e6acfded495"}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000600)=[&(0x7f0000000200)='/dev/fuse\x00', &(0x7f0000000240)='group_id', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)='\x00', &(0x7f0000000480)='group_id', &(0x7f00000004c0)='group_id', &(0x7f0000000500)='fuse\x00', &(0x7f0000000540)='fd', &(0x7f0000000580)='fd', &(0x7f00000005c0)='GPL\x00'], &(0x7f00000006c0)=[&(0x7f0000000680)='^(posix_acl_access\x00'], 0x800) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:06 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/4096) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75020000003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) seccomp(0x0, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x200, 0x40, 0x9, 0xfff}, {0x0, 0x9, 0x8, 0x4}, {0xb58, 0x200, 0x1a39a40f, 0x1}]}) timerfd_create(0x8, 0x80000) 16:32:07 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r2, &(0x7f0000000480)={0x158, 0x0, 0x5, [{0x3, 0x9e14, 0x1d, 0x10000, 'keyring+vboxnet1md5sumcpuset-'}, {0x5, 0x7, 0x8, 0x562f, 'rootmode'}, {0x6, 0x8, 0x8, 0x0, 'rootmode'}, {0x1, 0x3, 0x0, 0xe2e0}, {0x3, 0x1, 0xd, 0x100000000, 'keyringmd5sum'}, {0x5, 0x8, 0x18, 0xfffffffffffffff7, '/selinux/avc/hash_stats\x00'}, {0x0, 0x3, 0x5, 0x2, 'fuse\x00'}, {0x3, 0x7, 0x8, 0xff, 'rootmode'}, {0x5, 0xbaf, 0x2, 0x7, 'fd'}]}, 0x158) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd600"]) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x2001000, &(0x7f0000000180)='$ppp0trusted#em0self/GPLkeyringvmnet1\x00') unshare(0x8010000) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:07 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400001, 0x0) 16:32:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x88300, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) read$FUSE(r0, &(0x7f0000002000), 0x120f) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x801, 0x20080) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:syslogd_var_run_t:s0\x00', 0x27, 0x3) epoll_create1(0x80000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10080, 0x0) write$P9_RLOPEN(r1, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x8, 0x1}, 0x45b7fbb0}}, 0x18) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:07 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file1\x00', 0x1a2) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0x9) 16:32:07 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x2000, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x20, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RLOCK(r1, &(0x7f0000000280)={0x8, 0x35, 0x1, 0x1}, 0x8) pipe(&(0x7f00000001c0)) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r4, 0x0, 0x10005, 0x0) 16:32:07 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c727f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d4c69aa05ca037e8f7d1b89391618889d112074581d24e84cff0b3551a15d4b817cf6596457aebc16c59662fed646f53542eba6edfc2ffaf9bcaae395280e502ef9ed563a0e1d06989011f9218a8b33514c32c1498b870ae036925c55f40de2c398e0dacd2a3cf258132bcbd11ecbf089a82462673ac040608294bdf002459f97ea98312250ab22caf2", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:07 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0xc2) sendto$inet6(r0, &(0x7f0000000340)="aad13474e3b081e051d0df4e938591a38759cee354fd82930b34dc418ebe91809c78b51e9422681ca715331eaba2f9ac51fa69801d4517791e5f7c4d4b6735e4d8da4f4d67e27ec1d8d03c381f2117b8a4329d94e46175ca92886209345bb34fbbe2dc3f4e08032a269e3c5be0eb800b5c51133b7b35a7fee9b193a7ba66b36f599cac10a6f0a85ded2813686582ba9b0a649f0d7b264a70c0dfdb7c135cb805b7b3bec92821fba22720be3c9cf50e797c1109228e4a3ed58976c0f7aa1dabd96a2a", 0xc2, 0x20000000, &(0x7f0000000100)={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x1e}, 0x9}, 0x1c) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_hash='dont_hash'}, {@euid_gt={'euid>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) init_module(&(0x7f00000001c0)="766d6e657431f300", 0x8, &(0x7f0000000280)='fuse\x00') ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bpq0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) ioctl$KDENABIO(r0, 0x4b36) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000002c0)) [ 653.967714] audit: type=1400 audit(1544113927.759:37): avc: denied { associate } for pid=25471 comm="syz-executor5" name="fuse" dev="devtmpfs" ino=4690 scontext=system_u:object_r:syslogd_var_run_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 16:32:08 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="9b4ba0000000000015d5b9f526ad9b77fc405d57ce4a13462ac9003efa6408007540a3c9d432224665e4ef2691c80dd163a4269afce8629bc4490bdb181d422b99a133ce8200506db50844ac504e96380e7f278167581916dda2784bfb8a5bdc3ec998d78d22ef60a8e5ca3818dbcdba8637f856045680f27eedc0891d", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() umount2(&(0x7f0000000000)='./file0/file0\x00', 0x1) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000P00000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x140, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000480)={0x5, {{0xa, 0x4e22, 0xffffffffffffffdb, @dev={0xfe, 0x80, [], 0x15}, 0x401}}, {{0xa, 0x4e22, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0xe952}}}, 0x108) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000600)=[&(0x7f0000000180)='/dev/fuse\x00', &(0x7f0000000200)='user_id', &(0x7f0000000240)='fuse\x00', &(0x7f0000000340)='fuse\x00', &(0x7f0000000380)='rootmode', &(0x7f00000005c0)='\x00'], &(0x7f0000000680)=[&(0x7f0000000640)='user_id'], 0x1000) 16:32:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',g2oup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000340)="0e1d09e5694386868bebde06c8ea340e2f5d291984a86d69b2ce130765a6eeaac0504b86cd1d5641963897623a8abf9255d84758ee05d5a91f3c9b75235346381c81b0745e7a60f465b2f8eef6e7e9a642340a2d1e94") utime(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x2be5, 0x12000000}) set_robust_list(&(0x7f0000000200)={&(0x7f0000000180)={&(0x7f0000000100)}, 0x3ff}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:08 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x20001, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x3) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303edc33093030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000f80)=""/210, 0xffffffffffffffed) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, 0x4, {0x8, 0x4, 0x0, 0x6}}, 0x20) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$inet_tcp_buf(r5, 0x6, 0xe, &(0x7f0000000480)=""/207, &(0x7f00000000c0)=0xcf) write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r4, 0x0, 0x1d, &(0x7f0000000200)='#(keyring\'keyringem0security\x00', 0xffffffffffffffff}, 0x30) getpgid(r6) 16:32:08 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f00000001c0)='wlan1^\x00'}, 0x30) sched_getattr(r2, &(0x7f00000002c0), 0x30, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$KDDELIO(r0, 0x4b35, 0x25) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x3, 0x4) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000300)={'vlan0\x00', 0x5}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)) fstat(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x2000000, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r4}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000003000), 0x1000) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ae", 0x1}, {&(0x7f0000000480)="3ca5c151b91d3a9e6688a4d7114c65fa010490f7073416cc0fcaab554ff7754e4fb9e85c909bcf5649814a141fb365d01564728f6481cc6de4a9da6bca7ad507a7e9fbb51d6e040f08e317b319811232c281c682d60dd62d2d597fd79c60fd972c10b59cfd8ec8dae0646983bcfdbc74eb0eb8c0f186a2c65a6bdad18766a1bda8cef073d5b0e0f71c7b20cda4244b21c4c93b111494b88921dc3ed3a893ee85b8f0b346e92a6974f7b5238a129ae57da8861587690ae35cda", 0xb9}], 0x2, 0x2) fcntl$addseals(r0, 0x409, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x10100, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@empty, 0x13, r2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) dup3(r0, r0, 0x80000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:08 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='ro=\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:08 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:09 executing program 2: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000480)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) pkey_alloc(0x0, 0x2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:09 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='*selinux\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2ccbf44354515f3f34383e66e97231a568b5ac376ef1784193006a327e648b3e3ad44ba26fb89b346c0318f44ab861240a1ff41141abd5c0c5d22a845e6964fbcd8c66484b02dae3f802b2bc832d2ed48886abc0ff57d67248586d0ab746ef1f8d18d73a1d689483a787fce3510b0d80b05495b63b4ab45e38c7baf92cfd9dfc61c29a6eca619e296e1707c3aab0e0c31561013b12bf76797c1f0718dd3957359c7c4fe84d7549e6b0d4cfe3ba0923728c54bfa8d872daf47379c79e46f3a5631a449d7cccb85236e73a9f22154c597b682414070950aa6a394bf2129b7f30e3e2"]) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @mcast1, 0xffffffffffffffff}, 0x1c) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, 'tls\x00'}}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_role={'obj_role', 0x3d, '/dev/rtc0\x00'}}]}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="747275737465642e7365317efc57f1bc3815e4719e886371726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) link(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x34000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) r4 = accept4$inet(r3, 0x0, &(0x7f0000000200), 0x800) r5 = getpid() ioctl$LOOP_CLR_FD(r3, 0x4c01) signalfd(r4, &(0x7f0000000240)={0x47}, 0x8) syz_open_procfs$namespace(r5, &(0x7f0000000180)='ns/net\x00') 16:32:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) r2 = dup(r0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000008, 0x20010, r1, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:09 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x13, 0xfffffffffffffff5, 0x0, {0x0, 0x0, 0x73}}, 0xffffffffffffff5c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @multicast2, 0x1, 0x9, [@local, @dev={0xac, 0x14, 0x14, 0x1a}, @multicast2, @remote, @empty, @rand_addr=0x100, @rand_addr=0x1000, @loopback, @empty]}, 0x34) 16:32:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) eventfd2(0x1, 0x80800) dup3(r0, r0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:09 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2900000004000000000000000000000002000000000000000000000000000000edfdffff000000001b7266a26765b03a06efc024e03629bb5ebb914db3a9b63c93cc5fd5ed5dde2ec7a5713b27fa66cc864890db02ef595606a84134911b2ac7d5eaab21f948c83c68d1378ee0a783da319af8772b62d36909c56c06cd5bc5c59017d914317e5320e61727abc3136077bfc1f4ce247ce9e96301af1b54f5643c75a4b547a7cdd875aa5f6dd36f081732e1725ca85b38ccd7b3ecf4dd1038778009e990ede9f7573d668049f21934e26e7b15a47f70b6abbedf4b5c3eaf9ed819fe69d1b085f03fd7a493e50a335a0afad78dd5465432f42065"], 0x29) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x402, 0x0) write$selinux_load(r0, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "b8956ca72554b4f0fbed5c2765081179371892ebee6faa7e48aa25edc71ed0167318d7e5416464865996ca4857747b332372dcf274c5da6432fa284e71e4785a08107eef0d844acddbce07096e843b0993f81c4a5c8d771bb3a4fbac60d6c0a571c99d0837f30dd68d03dbfdced6166a182f0e4614cc1a0d79b170ebd5d085175a97487d4e18312e5518f21742c82a7423dbe0fb92d66d49633bba6c00f66a31ef28bd510c591d486067b9ca0dae4aacb8274885d8f6fac789d98e4d85ba233ce976b7029c0259cc03f7218d5f64649ead89137666f52b34b380df3867ab33f9b6ae474908c0f6f2c4"}, 0xf9) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:10 executing program 2: socketpair(0xf, 0x3, 0x6, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000840)={0xffffffffffffffff}) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000740)={0x90, 0x0, 0x1, {0xf7d, 0x1, 0x2, 0x1, 0x40, 0x602, {0x5, 0x0, 0x5, 0xffffffffffff8001, 0x1, 0xffffffffffffff51, 0x93, 0x81, 0x6, 0xdf, 0x0, r3, r4, 0x8, 0xffffffffffffc338}}}, 0x90) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0), 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=000000000000000 0040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="74727573d5bc0cb2dfbc61d3728d7ccb6974792e654d8882e7443c1c4f244eb1f8f53d86b614b79bedccfb3e3866acc10b5db95e255e092fd778484779bc364b7dc63b35a8d5d2ca50cfcbdf1be40a1cacb916270a2f05f49782aa99e075f2aa400907a65983ecaf04c44f7a42e9306b262b4a6040270413e8c8fce86b36ad43323df28efc0443f05d98dbc9a9441f394953c36e4d9d7d2adcd7c94431d51c41284b7dc9ecb2137e3fd3778291fcb33b8e887c995361b2"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r5, &(0x7f0000002000), 0x120f) timer_create(0x0, &(0x7f0000000100)={0x0, 0x200000000000002d, 0x0, @thr={&(0x7f0000000480)="55170f411eb59735124ed937e8be65cab26c9f525d202dd5e287b8239d62523cc40e059ee509c6f658ced21a20157f19c5047cf5f67d661b59d0da5d3722d11c1261f17ea03893ab0ec87eb53a1e3361327fe3430ac7de5c0122f2d209f80fc74a97b63898429c3be7d7e46c43a08d8f4c4e12046bcf5d49df0bddb591abd956565ac5e6b2e77e684b13e10aa967edb748cf7926df1dfbfd19f89f3c6b5728334e1eb5f8d584fcc1a0be95c06169b80e047eaf239abbfdbbfb5f208efbf45bd4328585", &(0x7f0000003000)="9393e35e8e96e494a071964d436666f9ad4ab5b4232cc2de5e6da47f1e7aca796db280e8e55a1931a8939b8e71cd40b637d3e05e72532516eb24140e876f8a20f2c8485013b9e773ca12cd340ef64e85497865077fc5082ec26faf9e241fc719048493291f6e237ed192156cb9ca599dc2fc5e07c18dd3cbc2318909e9507003dc69d8b90fe7b462a0335f39c92e07ba2b4f16c7e6a29ae0df0f1233106a339ca171ba49b17429c80338c90ef52007761731de50f0212dbb1ce395af7b376b2944807ffb2768acd9795db09d4778259932df7b140f544868c294abbff2b98c738ef7de249a2a31ae20064f94de97532c13f67f7f2e80a1a8ae6bf78b52127bf2b704e2c93d6aa3c10d61b1dbc126cc74360f304419ced29a3d1928f4d87a618681fe300d19016f0e738ec63ed1ea82a298f469a3381ee9aa846aeb11f2767b7b747c587b9dd9e33da9d6b08d2012c0ff143b7fbff441069ba249f49c8c46ce12977b5eda25cb968f8c9fd0f505060b4dcaa47b3665eb7f44cd07eeda5c8cbdf0cbba88febfc23ee8bcbf4754e816c05b42f687ba6a53038c26f54a6e7be8e39ef03d9defffce61ffab927cb2856e8a617283f9736c4ed67c04c746ceaddb2acd6d6f00b06b1137add5e2e712a472b4d1459e515a595f8b7df68bbea21be7b1b84440a7f9c949737cc9f4148f03fc816acf9019d0f6a32241756a9d06cd76d9ef68fbcd64eb71202f38fab90a8fbde1d93c9610c07ecf167c1763bb76c2740d4add8223114fc336bf5286e8a11ab8975d849bf7d04a84589741c2ad7c37a66e7f6439b3fe649987a1b888e99a358c3279376fdc780a98ce3e11db5b36bbe7135392f89a0e56d8d6a70c38973803f33f7b5d4d308106e8aaf4fd301eef70cf7f78ff4a8d60917f1d28d7689560a89d43f5c3ac18fb52e4d82a0dd1cecec47336b2238b469a7352c6cd9ef32a5964c96d2c1755451cb407fc236e5a30a0d14c878ee506ad19e190cda80e1a3300990678eccacc76c13d3edcf9de5eecd0621575913b1d5761410ec22bb055c588d022a2dc085a088e9c6329538bdc2824f9379922dc89d9cb45206c25793e799326d4edf021474bbe86192d3d12cdaa3541fbe72659bc9238292aa98fdac80102efe80d3f2958963265982bf854fd45db5ba62b265462bf91fa7b32799d90578c138ad38276e4b8e17f0542350cb0143cacb07fea7d19381ae3ad59db9fc2b71d5c875c4a63c33db3dc287214c0342c70b26579c17a8d5a498376f61d83c46ff0daf372186c69eec57e7b29a293c27a88d62318b7711b27b6d536218200bd5fefe084724beda34b3bdc7aed69179390b69f33dc05a876306ae74a9789c23f5035a7dc9a5132613d120561d49aaffdf5908c57f644a653cb35847c2799b926b2d4e72271b887c2d7c2b4459ae821fbc44070b3c19219a54a075dfd63d4e5078fad9283980ca6d6fc46191c9d71edc00d266f51a25b5f21f7b6cfbdc70220f9df4ea7f6cd2cc4ab16ec97b4a89f1a986a1ce9a0a15280d0525f7cd814f5ed688d49d7dc11fbb66e33b6351dbca7e43b962403ec793c7d4348a453a0357a30c6bba3fa8e89bc818ddab7e9f92a713f5b397a9169d239cc87d48c7613e8c59aa9d6472849c2fd5c715da4cedb0d37e03040a6974872d7522068525f061ce22b7c5caf15099c50264d94314fa375335e5cf41ad6f4d8054488b1a113b221faa1aecb93a9dfaf3952d9f73652913f94bae02fc0052755999cbfc1ce922289ab03455d9d2ecf4cb9f1bf4e1e1a5ca6346b87f576471ed49544ce5c4a147a1339db4b55290adee0d8e85fc2ff0f5a20d22f15a860fa1a127e1253efded6e7c5ac8b20c0a62ce83d6c27d6e335f5acb6a6600cca41641d8708491c0c58fa5ae059f5e0213b3f8c7ca9ac885fefc3a62ca0d2158d878071ffee85903978d7a24336e65dcfbdf9f0dd9b83c901cebd80dd4747dbfcfd9fe1b5e37813c504e293880439405d28629fa9fb9262ba3924a20c3cc2e08431ed5470165f1c0358200155abc737bd53316acbe9bb0a01e858a13c29933fb8096095f31a695f6777dfa97f14f6157950a2323e3bc8813b8eca86c6e22fce1e7df923a129c7ac237bad48afc35829d109b47840c2038b84404abcc41c6e7dce34c14786bed5197624543cdfa7f2ca76d6fbba69c2388f0939c502e42acd6c01f45ce6e4894e19c9a949a6e3e3117f4b4f3d956b44df4f66f540ab8275a980b14dfd232ce4bff20b67b21d456fcc12e0b264d5d60fca20dec19d95430154b92091ef001f964ff790bcec267b11a861c31f0a187da5c482d65395741330f6f3843f0e9b4c3dbc7b80d18b8582fd412729a4f36c0d798f8f005db88a33a39da35d47c904f12acce5c236123998f9a550295c0eff4f268492d23976dca839e75e5cc040aba7492c04af54888d1b6df04ee2b298ea5174a744165170091abe7030900bba746c0ac39c0db2a1b24b618c061547c7bb20fd9b2551f156bb8090f399cf6851265092e26cdee347669ef099ca2de33d5d97ad0c694bc5c7c9703d03e6e44dcbd3bfad4aea311debe6fc85d99800abd40b20366246501c3b893a9dc4403f5176922f0804a01ef818ca5686ba071edf1c49dc1da30e1026c45851b0f7c28928d0396a1add276bf33cb1ce1f4ca9e32a70d0d908f511f69f160df8aa2650c1be391c9690f9b460ad3a5a209f51b69ab1274c0873139fb1767d422be2090b698ec17b7456959ce7fab898e32883bedf9dd446ad9eb22bd486dd3ed96a0f32d7a9cd0dedd4b7be0ba9dcba138f97b71c55b11d462a132ed36cd565d56348ec4b82934dceca886d48f9e4f80e53ffcd59f3ab6470fe6d7dd63255adef0e421038029b37d280199f7e71f2ac6748c8b0ec00d31d100b9de45436858390312f52d48e783178010d74e02a6e47de67527c378780090f882f8678fba3b2c92b53f716f9cf7534e8e385c1fd65eb4c93c69549f3cab655329388e168b4dde7c404883bdf26a308b2371a326462a300447a6e9885e33afca3a9e76030f520db9b8b4e9e3f1154592821bfbb4045f9f00a2972a0ff53a56175df60aaa058bdcfca20030497d45430c7661f066393c2b2f8f5eabdcd63978a3f77745d8590fb9938e2a350ce9df3dcfd9643e8c0ac585081cbd252e2c24bb3b2568e11a01df0eb09821bf62af1fd5a02a693ff5ef15763168a72903feea1c65d5988cb0183179babf75d1522f79c8e3de430b4e96beda7955f6b6d4602eb5e5713ecd8f54e9be64ea624712dab7a663c104c39dcc4a0f1808012056c78caa6204524c5503489064e97e388f2fcec14d2243c391aaeef145532683fddb4ef73d00e357718b8e57c402c96fd9b1a1a49379e716c28cf53cd808f316c793dbe51141b82dffa2ed3e0032b5fbb6458a2e8478dda044c17f1a5b4348bfa734b328bbc6e71dbf7ca8097b54b68c3169182ae6516fe59c26baf438ad13ee320e1b172d4d67645cbbce573a9ba7f138e07ceb26866e36799365e1ae6e1c5cec09e76fbd20e8ce3fecea50277d28d908cff59dbad67b73b4cfa3e8f3dc01ccd1d76f9706ea2570a7da11d3a6d22f40052ba62f75cf94183849a67401e6ad6fae969a53b4169b8b691284458b6c736153b54efc016151e95b4af612a7d05c37a224af1a5796be3b90e4299043a6dcc9499b947942e8d8e1daa4842dc051cf0d633566ceb8250fb6e8fc89efe56666a6bda1586708c6f8ca66ac51f2d44f11996d1b92a26e61bf3a8f2ac6085fcd263c0e5abb5bf5f88fbac4e420c3a338062e63c6d672a17ce05d6a8ffe11df9ac4a84c9e8801a6e41306f40e216135e4a955c8ecde6b441eef8670e9f527447130d1e0ac4e963a9ee09dba86ebc29ee185304f6c803715b4fc7145cb912faa5348005df15f89f1d91c9cd28f8bfb02be9728ce33160cfbb0e11589409ca08b040c4b4a272a7c1d78da9ba9d3f53152f57e0c264ea45a26fd056c6137f339f22c2bba597dd46a2d184517963e978c623881a19d88608a217a426beb3a59b6bad99fced6b1fa5f44c0d6a42ab65a5b08eacfd0b823a80a4edb7598fa0c2e4eed4633113ced0e4aacfb204e4d97d6f335dc2d4b06dc674de83794882f405ab6ed4686246424c1f67363255cf6c929ee0050ed8cf38af51d504834d4ce1d7485bd1160854e328823a4f540720849713364f61eb2839b95b5029a3b94928255e5740f4483177a8161e53b35b2136616cd204797f875bc816fd7f2bcd040a7b4ec0554dd4b75d99b04aff3653132b4e5fc72f312ef35012a0b40d8f6dc097a99074fc94ad891e66dfc6e5b967d3c3444c54daef23e59653e47b974ed3747683b3fdd0af6b6ec9339cad085338f0fd729a1a81e8907c440ed818b15e67504709ecef98b019a6183162b509cee073b9f134d82bca661a6465901396a318e8e3c89f12d283ad4fc5e532dc9e2f3ade2908020359aa5d1b7c730c25138768960c1ed526fb94d70f045d868bf3a20efd325630287497e3849134f299d21aec63120696d84dd1a2718980437f6393a0f89523b44e77c2ec3cab4f14048a4ac396e82296699db9cdc63ec029e8bfb54a230e4753a348598b19eaa2cefd3a475c4dcd96e769a567396432108775857ad71c4616b68140b7341025c5c3c718050cfb120d6c587479b5f8dcd02c0ff63efeada3adbceebe91f13b57041a21b4de20767315b99467e70d2daa80b78d69a1297be233aca11623b36136cca5f7fccf6794a9106d404e01ed70913caef6aa7a2b904806b918d90b3cfdd779001dc41a27757c83fae519f07e088c0b2667a13f5eb62737ddcf6ab24511390a87a1adf4f54d5d5da725c51450f5f8c216ddaa6500cb8085e4f8ae15adb0960cff9d2f1a61c1a2cdc1ddc270854fa437283ea73d5c97c9b7b725844bdc25ab09243136bd2341ba791288b1a9d6ba0c8ffae4b68f2f9d135855f32b716a3b8cb39ead6107383f29b9b6270caa9fce65090905308f16c9e06b77ed787d37721383e58cf9d3c7b8f38e718898490c1739a7ff131c202590932543bbba60a2efb1382056b3af8726d30205fce307c268e46d236ed510ff57d8e0e8bd0de66e68f6c07e36b837a534f731f301eeeadb10fbe617a42e50e393e309d79c717df53e8232f1bc85173bc239d87ab5ac87945a63b73fe6d62beeebb9c9d8d4d43cd5155c7087beb574b4d539db35ae7ed5200e45d6b790f5e5e4f3c0f877280e56909504d1dbc73c12b548d46c747ca9c8bbc5e1f8c2096c108d1ab3d6a6eda7298beab4354bbee1bf25405f69ca8aa9329ba20adde6c260719b4c49bd7c6b330ec4532e18b50e6b1e253bbbe97e508703806e98133e914f70046a9559e22abfef2f310257a3db1f1cf329d07744c5be1aeec1f25703491f99cb5cdca8dce94a8485b7674eab8a5ddfb70eb3298fe1758826e1afdb21e00bfdd3966e26a54d566e20ac0ab26b5db5325dcceebf498e25464ba1787d3604b19053eb4aadb334b923fb00d5beae30a93a4bf5a04f614c162776d10eaf41e7fa84c5de70f6c739479ec2eb5f7ed9f4c4f7a26200735d3fbce26a7f9514fdf05fdff09708e67c4bd1323757dbeaceb4605c7a8e032d38c62afbc621d2b2c8864267a3fe4e8e844e88e6c5933ee21586249385099eadbcbfdd263217f5db9decfe3f764d783d39353cee44d5ad927f93b756bff9aaf1e2427f8304bd1545f660736ceaa5c19fe12c6635b3177b98b06eabb031a6375736a49b443ed4682a964b19"}}, &(0x7f0000000180)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}, 0x4e23, 0x101, 0x4e24, 0xfffffffffffffff7, 0xa, 0x80, 0x20, 0x2b, 0x0, r3}, {0x1, 0x80000001, 0x76f, 0xc44, 0xa764, 0x100000000, 0x7}, {0x65f929eb, 0x101, 0x6, 0x80000000}, 0x296, 0x6e6bbc, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast1, 0x4d2, 0xff}, 0xa, @in6=@mcast1, 0x3500, 0x1, 0x1, 0x3, 0x8001, 0x200, 0x1}}, 0xe8) read$FUSE(r5, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r5, &(0x7f0000000200)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0xfcbd) gettid() prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0xfa45) write$FUSE_INTERRUPT(r5, &(0x7f00000003c0)={0x2, 0x0, 0x2}, 0x10) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0xf, 0x2}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) write$P9_RREADDIR(r1, &(0x7f0000000340)={0xe4, 0x29, 0x2, {0x5, [{{0x40, 0x0, 0x1}, 0x8001, 0x8, 0x7, './file0'}, {{0x40, 0x1, 0x4}, 0x7, 0x10001, 0x7, './file0'}, {{0x0, 0x4, 0x1}, 0x9, 0xffffffff, 0x7, './file1'}, {{0x1, 0x0, 0x7}, 0x1, 0x1, 0x7, './file0'}, {{0x80, 0x3, 0x2}, 0x90, 0xb4d5, 0x7, './file0'}, {{0x4, 0x0, 0x7}, 0xa51, 0x7, 0x7, './file0'}, {{0x4, 0x0, 0x4}, 0x8, 0x5, 0x7, './file0'}]}}, 0xe4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) write$UHID_INPUT(r1, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="66643fef91a907245e544d0744b2972e57f8aba6adddfa019efbc9d30673603c100000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000180)=""/174) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e20, 0x80000001, @mcast2, 0x907}, {0xa, 0x4e20, 0x30ec, @mcast1, 0x9}, 0x4, [0xad60, 0x3f, 0x6, 0x4, 0x4, 0x49c, 0xdfca, 0x80]}, 0x5c) read$FUSE(r0, &(0x7f0000002000), 0x120f) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000003000), 0x129e) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) write$selinux_user(r0, &(0x7f00000000c0)={'system_u:object_r:netcontrol_device_t:s0', 0x20, 'unconfined_u\x00'}, 0x36) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r2, 0xb00, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4f6b7c9124c4f2109ae1bae1a2099fdd6988"]) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x1000000004}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:10 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @rand_addr, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x1e}, r1}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x5, 0x9, 0x7, 0x0, 0x2, 0x3, 0x5, 0x2fa, 0x38, 0x2dd, 0x5, 0xcb7c, 0x20, 0x2, 0x200, 0x100000000, 0x2}, [{0x8225b65d35b52767, 0x81, 0x1f, 0x5, 0x8, 0x0, 0x8, 0x100000001}], "d2064354ecb0470f7ec282649941ea45680c999b280e4ffcca6dfe6e828190167e3fc2745336b8865d8827e2cb26ebaec44c03f163a0e40401bc9b8c1bd8e46696c6c716e816ae65a85646d1522b7dd116871ac9126f944ab4b1c0c14d99b0e66ceaaa4ef35f7ce68138013b37baa733ace526870f7cad0495bcc3d40e63a34b", [[], [], [], [], [], []]}, 0x6d8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642e73656375726974032e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r1, &(0x7f00000000c0)=@ipx={0x4, 0x7, 0x764, "9ec70bbd4cb2", 0x7}, 0x80) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r2 = memfd_create(&(0x7f0000000000)='security.evm\x00', 0x2) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000200)=0xd11) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) setfsuid(r3) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='f$=', @ANYRESHEX=r2, @ANYBLOB=',r\a\x00tmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r0, 0x0, 0x56, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) write$P9_RWALK(r1, &(0x7f0000000100)={0x16, 0x6f, 0x2, {0x1, [{0x40, 0x2, 0x1}]}}, 0x16) 16:32:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x418000, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/access\x00', 0x2, 0x0) r5 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) fstat(r3, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000d00)={&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000a80)=[{&(0x7f00000003c0)="cb6f036706f3e2994d3019a8ad7bf58b10d661d53f0567af06d85d82e3ea904f6cc0897b69bba7971426d9d0379158c6f3027314184d6a5d7004b322c1fee19fc2ccc781e0af554735c767ca20eba0ddf79b035e10cec79d0ef89f4f92c7d2092926f3cc63b721068ea707f03b15259c7460d1aee17b9e3514688a90eebd263e908ee26c556d80fdaa891add7751f4038bc0ca8b0be666d68c86f83564e1635e0d903ae35f218cc16a7b80940d409994f29ecb5e9f5ff8e3b0975f000931a933180f05022e16023155369878d515a1081cd804b74d52f7146e40fe5a755d3c82c8bf82f1eb72e634753afc9de1e9865a1aec6b3888a8bcd22540", 0xfa}, {&(0x7f00000004c0)="91d022a28e49c0f8f6d3f48da5b0f8f9e476a53bc7d29f7f3be43205da73382ec764e19fc3b61f7b890bde7d39013fe164efd220fff2d42381f730157b0ea2212a35c335e0f1826580a0664b3330c0d0a5c20bf37dcdcab8195e57d3277405ba4ebe9cffaea830", 0x67}, {&(0x7f0000000140)="839976c220c8830098246f49df7e8ea5812fe79cd71848d34915e8110195c1769e0cf6ffaf86651df7fd24a260f21c11350a91f5c8df0c8336cda8153cd9", 0x3e}, {&(0x7f00000007c0)="b267551f2f58adb9a786b5bfb821580b9396af4bcc4821d9d914b6cff8f3c5a1f0c41975984289ac9520ecf743fe3a34d1c30c44f5913e1a6193a330ad197a390d231fed4b909284c18723b986a8c4b4a1bfbcbbb90fa16d5f312fa164240db2dd7a", 0x62}, {&(0x7f0000000840)="3f0b6eb1f6110083316f184f28514772929a8ff24c7913b51417afabf7f31d83df534c78715918ea2ee55bffa0e6d3d4a7c04a1d36d4618590c4d4671f12ae76701dd64b1a", 0x45}, {&(0x7f00000008c0)="7a8dd0171b9d5062a09f8d7bf6e5d4be9ab3ac87ecd02281b0dace726184e735779d445bf7f8a50a58d26d58adebb29a2626b9a708b8d368700ec64c89fd2a4e001ee7a3bf19c1ae6704dfc3c5a5830f476347fd715b15b480ea7bd2d007260ba05dc55b51b6e8e60162d7e09a531877da28e6b29b87ea61f1e5953aaac2974a9629d9097a550832bf811a3a778c4265c4fce4bdeca18395e995cadb2b1faf1614ef07bf05", 0xa5}, {&(0x7f0000000980)="aeefa014fc6a83da136a2e302253cafb53a3930b2b8fcf015d07be4a3c7ab78bef72237eb6f93f178562c54fe7a0265c139ab767f703c766ad2885efaa52697abf621b0bfa63458bd0625a96fc3ec7bd5a02db37896e5c094163ea14e1487a3f4793c06594db3646786f1a76c8149635d946db554d96650fa3cdb886fa24feeae69179922880007041561a7d5c36d909fa2bf26d4b810e3392573c35b6abd9fd9e3444a73e0b62aaee666a1ad480ea667072f75c91905e9d6e9e366e71771563731ce92a7a0017144a23f63b1d727f", 0xcf}], 0x7, &(0x7f0000000d40)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="200000000000000001000000020000006d20131c2d7da8c1fa87c2c6fef78263b113fa", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0x60, 0x80}, 0x4) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="000000eb14b3dfbea54a0677ce3328e15e810542d093324ba7173b887e67e8c850f3a36a6fedee0f506753fceec22b0dade3c32a54bb01033738ae028bf2ac9df02ed3fb21b60c2db2dd6fbbfb67c98178f039c51a4522ecb2b2a15f2859f4cf270cbe247873b02fe7e0fa00d6e29725f5765fd0bf93147e85c6a3b40ce66bae01953242c91c55724db4d0fbdbdacf27f9f4cc5649792485d5c2367ed22c33ca373be040452217039a5357a90d138215983858026108ddf240d02331a06dd5ac7cbc29795877cb1643352c9b65f62bf5cb2842f9b5de", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbdb5524bc21487b43ddefaa0671d827c7504dc402ad9eb2862fc08edcc31cf8091135ae3b43c9f48c5593941ba5c79e93dfdc375c29fd8155dd0aa523f324c44572834c3084aed6193208b8cc97804e2aebf7c7c6ca78e05388b8063787b3f2d86577a70a1a47747624771143fbb710a6443ff8085f27242d748fb24fbebf70319ad144a8a817c6539b7c6475c2acb474aa055ab9c508c5b9e7076afab5f3ff8dcf13dde2a7d277067bfb7a79a11e17f927585685cb3f1d23cd7eb1f55101a8219eadb793317f194be912021b3390b65e263421fd0f1fcd2afeec1db9a97b0e080", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)=0xcd4e) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0xffff, 0x0, 0x0, 0x3}}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:11 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000040)='./file0\x00', 0x3) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) futimesat(r1, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)={{0x77359400}, {0x0, 0x7530}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="3209eb", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f66be5b4865224a1b757f5ee58eb1dd3769643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:11 executing program 2: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x50000, 0x2) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1a3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="24610f653966faf3106ee635c3765d45c406bd9d4b61906fa54ea5a0ade43ca431d343cf2162b3ce816c314603dd2c687a5144e09393496a22a4a132e11f575ea10300000038a2a59ad579b9c4457cebc577ea2b4872766db8e0f6003b6d1f3b814b", @ANYRESDEC=0x0, @ANYBLOB="2c00184667deed3bad6e01535993"]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x2240c, &(0x7f0000000180)='-#::-\x00') read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:11 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x28480, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x200, 0x3, 0x9, 0x0, 0x2bc0000}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x7, 0x0, 0x2}, 0x10) 16:32:11 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x1579) read$FUSE(r0, &(0x7f0000005000), 0x1000) getsockname(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000480)={'broute\x00', 0x0, 0x4, 0x73, [], 0x7, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)=""/115}, &(0x7f0000000180)=0x78) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000100)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003000)={0x8, "51d4458d820fb6890351510b4739ea58f2275e718d8ea845d6adb7eb67c20d2fc253362c238c1cbd2bccb3c75f3691371965e9fb793d836ae19b1be96305bd7a6802443174bbaa9a612b09eb94ab08ce568189cdd39b09f212cac91f05be2ca3c3bd4b6fdb68a95cde1c97b8eaf72d76fa717e1e813db7e24727448cc8a37050c306c8f9ff0d1c0237734f38d81fe52586e9474a710dac054a5e9600e730ef0a900a7d92e540d6523e3f93ea8c45059f9c5b5fa14c4152d87a1527c70f930e7f2d9ef755c763feef4e4473286cef91fafd5bb9086776e30cce53225b2afb5fdcc53fa41b490adff9873f3ac0716d15dcd297041b61990a4a044855163ed119170f9920ac6a646ec24412b27cf18135e36885f756e51ca37f834c7484644ab8862c40cd6f371cdcc4c471140676d5e5b0331c83bec79113ac5ff26408b4ae110d7e705926398f58f08e116cc7379f53e81749f894832ad95cc416c4e3646545d185a5633b2b5cf11520650582427f365b586ccaa4d20f9ed7ec26d138d70631a35a37b7a9d939776119231425353facb2acb6ce93468d7533dadd539c618295f680c8b7b120c4ee5950dd953925ef82c5477aefc59bebc2882257991772f936da450cd7c7ebf3600facec438ad21a2226cfdb1918910c68afff8ca0eb6b5e283b3f45f9f41cb8fbf9b2d9c96f5e7802fd72d2f0114b7b141d249b46de44a9d3de50593a3ce8415c45a6942dfb949870da8feff00b6033d24bef6c6f7f1966c8c3743f7126010ce07e6757be5ffd8140db6da7e1fdf2416d2d8239ef96efd319febfa76033a31e422fd81f64c98d60fc6600b6039a7719eaa7b101daea5532ffa5bc5cd77ba339b3ddae15220b1c4fbe37f8e417f0c9d3a2c8c3d7516d4550aff9ae8f98ee30eecccaa4a0ed316e683d4a09443331e75da358fc350c772af2ba15b4f1e7434ff027d65ee4c8e7476951ec7809968a4c2ab6002319fd9bf75292468293e9ca2d4547a1a4b910830fa070314cc42b5905a3d5a736f1780b2d436ae52c98d51925ae0f9f234ec5780a5083af24878f6a02c9bd465748d9b0a04e829307f064d65122cd525db786d2244949703aaffb877e3a19d65bce5c3c8ea3189d788645b86e5e2321906295dc6eaa60c51f2d47d99de519aed18ab3e85b5d5e051a12c22b08d13bf46cbdf9610305afec96c3c3c1ccae6846782d36a39aa7770cff21626dffe6db2fba647dcb6b8a15672ab4b3bd9747b8372923998755d5d5ea77c6534e0da6976639d7ddc7432b00e216324e6080449a2cbc09a8a2df8076bcbb626a6dc03f4d326a68fc43167ddbd15fac866b6d294debed22c72c4d8c3bd692dc45c1e73e40d766299c401b2eadebb24d38bbdacc1c34c876f2e7894043ca69036e04927c04efca4a16ad4adaf6179cfa2c1ca69be1ea7c76ea26fba0470477db39b02ff0220e24ed81ff9f2313ca0df6b500c114aaefaaf7cff9cc5b238e7c1177e67ade4ac6c29e582f56b1c9e779929fd6c4d60e22ad304d003a97e5a00b1921649299decb889afa11605e5ad0d70b230ea61cef5f90b29b3d0bd7e40046d000ab0229f30fdba528ca3c0a8207fbf02dc2a1d232ca9b29e39732334e89a79cdbb4ca77c5208ee782970996b0439159c4458f7ad41a9f296dcd9a5d2ac08a7666f17ec273724b21d33603dce67772bffde286abe7fe33445252751622982e362729a42007fb01102ee37b0bc433baa9cc0f958a0603aeb797e190ca285c7a4b3c68a9a696c1d4b6a7614fc78b4c0f9c34556136d50024d6c241a005efaa08843e7b0dce7240ce445e32904c8dbf0d0e6685dbe5f14627218979513269965ef7c1e34509b54fa9ba7bde993c8d6f53a76a7c89508681b83aaa8672c196f5804facc484d476317172a85850be460a289a84242d50df3614614b9a5fe3f162c03ce17530736f4d171785c08754471faf41577ee61cff4fdd37e1b76e54a8fb8e40a89b21c5f3c22d3106524192f96eb6ef757899e32696aa41d0def5679bcb555484cc17cb6f40d8998b71d34a4ac0834d38339fe709eba082c56ddd7ae8e698d52dfcc961dba263b110bedd8b7e4d4ce1f4be715c57311f9b9884b851f63cf90ef7d9b62df03fda8c7fdb0d90ac3e8fc8acbcac44d253cb7d5887e1c68447af7909f595ae683f69211ad9be7bd64e578eefaba55aba60629671abbfcb221f9c53d04ec31bbd5870c361a4a8ff1d1ce496b39baf623e7ec69ca2051edd07f673c1acfdf88e4050cccfe8f56068d832f0ac6b526065bef2a75c99a3f898c2bee6614bb3154f5e04249660ebbd73adff59763ca389db631944e610511caae3c4312627d25d30e2c2ee35663868373c228d2d166d722fe8a1f27a3140e927330488d853081178aeae31a553303c503773d778622ae9072a00f374d79649b84a909084f93b5c93f6e591c84d01786082e3d6c698cfcffb2c76cc474842f12c1526ea2796be36367de618a132a11a69948895be5487548a489068475a1a38375137b5f5b92a7f20b61e749eb35b63c83df707ac5c8fa07dad9b84bc7490efe11304857eb893ccac56bb70917aedb684ffddc8686365d8ca1e6c1008a5f26ed05b976720ff5c42462313346efdf2ccaa291693a7170d33ce8e64278e1088fa5013e1b62e277920d2a68d37068e29f08658d0cc4ce7269907968526ad0fb21d27090cf61a5982ad3f2b0dd4bfc5aa8da91a366c9ca3b122e4b19afd99bcd9f9ff2dbc7239f29b41e86159149bd282fe30315c9f0dfc8058f1afc30f7c40b3142eb2f8b0b9ee939e5854421778345eeb91d7fad1e803df575ce3d41c7280bb56215b10247e62ba94c2bd59a7d29a89d5eb9bcb15609f30a15ccc2827e9802708b535eadc198a6b52c4cb2029f3b92e6482f7d585ed285911890c56a0390c91d64caed6cc34a925f17b1f114d947a521c6e2f5fe6793d29f024dd75560815333eadc0f9ebbf421993c90af8f88fe3b3831b0feb6014ddaca01499ee918cf5dfb851f1d9909c9dacbc9c0df8864267ce04d19f6a70a5dacdd3db320924a8b14ef513a5f4239c9bab41565f06498851b8b13b43eea2a9b609e4ecbdf1a976c4e48795a08ef718999b3f62347e69e58e1c42d2321e69de8c520100db09b5ad3fcb1ac0ee17bdeac112d0b6f5d4597067fd26c12d0b6fed5d776e0171982828ca5009ce550821f9ba600f3a1ed10a83abe9f39344e83d3bebd4ea7c64b0d4d91284b109f024a46868b1a8500afecd7b19bc7740290c633f4473727dc5bf94008a02e6af1388597e2985ed086e9e1fed3b85f1582f859c650378211df2ec5895d76c7f319419877c3873606d0af61789aa2f9cd33556b7404697a3db5a724053a91cead452c4e01a3e5dcd57330d8d44e859a7f548f886ec2c3e2a693892b4fbd357b017d625e92939a67a2a96a39a9e9568d2f4f06d5d860273755fc3700eef7ac0880dd3ab0ea206f84f08fff15fa768918eb1ac33350e26cd6acec75c0c7a6e896d56b4e84d9157ad24a78e120f44d72f517290bb64a4115a19663c1b816923852530ce2426c96f0ab7990f4558eed258fa2405c1a5c4abdd44c1d51b6ac65da4e92050b7222fd62dbd4bd6784ca75b11b4e2658f31a1e8c0a358131a7a0d2e2dea2a39d9c651d2e2ccc7bfdd37c95f7593bdaae5715c5d81e1d0dc8b10a0a992a74c685304fe20983bde779abef21fac571afda97a27acd9d02c9532df98b1b2e5d2bd117042ab995b6ffb8366fa810e9fe2a9d7b2097350e6daaed34799d6bea556cc152d2f121dba497a85262f4eefc6e077bc9f265329ca58a0edacafd1d41592eedc2d9fa0953d7f58bc00f2a2fddb97f833bfec4ea70ce9f7907e548621e3808a3ccfd3bbe26a78c64e9f7449725b0cc0248e275e2b8857b0b2bbc192cd42f766b458ff4f52b1786d86a3d321d4c0681e70cedcd353f6758bb9bc1cd25aed9ab2fdda3f60ea3f793f3f00f9e2a0771b3eb995ae81d72d99558b268b7276d2a3fa227af2b3b977982c6c8be20b55ef1835a8c623c941e43d5fe805021a6844e9c6cbde2bbd6dbbffa1e60ebc8a9c26eb35a68ef0d30a14a08f4b74d176d0b5473fa111e2d85529db2a63adf95429f30edf2151b4b51e16202e9084f0fc67beb26a0256db8e60595478cdc1831ec817d4db687b31a8333bad36d31afd9ccd215afafe38d79ab397d54eb87756df6ea74ae9a51c7436447197f2990faa0e8dd12d5cd94dfe491bfe3ff684d566ae2d172c781029fb11e54ba20a7b4973cbf9893131a94ec7ced8551efa4a50512a64c23364c33b5a73c5b274e97c761e93aae293142d12d5d4235cf667ea6025ae600b99cde80c000ccab907d64cb96e834ff62b048c4aed5ca67fbcac64cffebac4e8625e5ec78c4dcc1fb3b4aed6ae673085bd3d5c72352d81dbf383b7d6d85a148c49ab6b908a09012f901b0cad6c6173bd76a358d5651d9156ea18dbf3d0e22bb21ad77043faa37bad3df6a570db273f542ce8a572249682e5d5fd6659e46690256897db5eb35c703036e0886e6a15c5157f28e0679bc9e312b247f4c639aaf3e81e047425e5b16be02d072e502809c440655c59e7c80d92b36d1b589391b8ad6f7b050fe2c14f2ff6ad133e1dac255383e342a6403b19cb2fc62731aa986391d901edd0d0a1f19930f60ca6fa22263ff7b00f9263dbf0b0440b30e96f191b6e41dac7d319617ce10c5387e53fe64691e096d69dbbc7e276427f5575c002e1de5cb65092b3a818e4fd2f6e682561cbfdbb4f17b65d17dfff458d3a5881f7832799a42e0b38458924f667ac40d4a83247ae3e4685aaf174497b6fd01b068f0cd88efc2f3807573d4b2bab763f666546b4cead3d5263f6b31a14daaa82877c30175789d5aec83b667bc045be0368734caa79ec3476071b211870d21dee45f8073bb14a26b7d03aa5de83a2febcc63c0a603b27c01656fe3adb460b90b428a552fcd31f86ae0d9de624b3e1fda04990f87760da7d5bea7122a8846e7ad5c13c743c285f4cbdd7e86f5478659a422e466584ecd40026a86a55896e7fae83fdd990cd8ae0562b069a1f614736a440937ea6ed9c9eb315d1637d7b2103d75d4ced145dbd59a6ff99ccad2e194cfa9fe98bfc6b0f8e609f5a82816e03f87abeb94fc68e3020135211d0dc91742e0ab07614a265bbadd141e10c68e51b5d510d6582093de17c265285b7bb2e5052bb898a8adf020493887a2663febc07d70f463e212a2f172d0b05deb1c3d3cdc9898031eeadb6d494e647e4f6bd416f43fd94dbc287d9f32457c400101d50a98bdfca5ba66cc4b254a3fc1cedccfcc99c7df18ca968bd7a13980310f97ae8183db101904fe4a628bcc5f9d2a31fccf9b1475784af201edff7b5dc0f47e253de64f7e93fd70289bc503fb359a1cc8207c05a607cd93a4ea3f048250c59d636b675adffac069ed133e7393df3142dd2ce638f38d14c2b1668a2ad96d7219273293441f50971409841ff00e73bb298ddf5407da5374c1dd66cfd5f30414c1bb265109f75e0df8fbd3e3fb3772e0181219da51879c99283e4408380eba25dee7439a34390f3ac14e9d3b81ae21a682efeada6c87b8b6b693cb955253c233f48fcec753f35a80a1ee67e2fe4691cbdb0086108210a78b416465a03a01e8c6e1ab3a81b84d13d0d0a36173aa902b5755a99bf79a6e65a677efbc0e28daa535a39f7a73fdce457d25e366ab865fbfac3138ec3c2bf387ec0663c30fd6b8d35381fdf11b7b4b0cad059990a136ebd", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) 16:32:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000003000)={0x8, "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", 0x1000}, 0x1006) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x23) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r2 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000580)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x6}, [{0x2, 0x1, r1}, {0x2, 0x6, r2}, {0x2, 0x1, r3}], {0x4, 0x2}, [], {}, {0x20, 0x5}}, 0x3c, 0x2) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/115) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@v2={0x7, 0x1, 0xd, 0x1, 0x76, "a8e0d85551baa1dea0ac63fc6eb7391f1bc194ca860af1044d2ce4b1e2fd6c1ece3c43463edc327cf020239351a899848abc0b95fd56217729250908219dd0209b443eb91b38f01bbb1261a3c1f937dd28143d87700c2f8e97bc4c5902eabce1060d0e65531f2daa3cefc4e5885441bb58a83d687ad2"}, 0x80, 0x3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c670e00000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0xfffffffffffffffc}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="0c652ea453d33f1c894bff011a020e8874d72936a298909f08dd34d8349107579e5b44a298c5c22f443774071c9eb216fb66af33154608a7e6d7716288260c384e5fff4a9981476e9b59f265759411a9c13469cd481df2b5ef641ecb94d02a3f3e847aa3cf81505806", 0x69, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0x9, r2) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x8, 0x3, 0x3}, 0x80}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000340)=""/237) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="870457e420eef5bbd1e73b744300", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) dup(r0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="6d6f64653d30303030193030303030303030303030303030303032322c736d61636b66736465663d81112c63707573657473656c696e757870726f63252c76626f786e65743073797374656d2c00"]) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000500)=@alg, 0x7a, &(0x7f0000000680)=[{&(0x7f0000000580)=""/14, 0xe}, {&(0x7f00000005c0)=""/181, 0xb5}], 0x2, &(0x7f00000006c0)=""/151, 0xfffffffffffffe73, 0x7}, 0x42) 16:32:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) getpid() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) chroot(&(0x7f0000000100)='./file1\x00') read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x4, 0x0, 0xeedb}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6f99720eb4305e11, 0x0) setxattr(&(0x7f0000000380)='./file2\x00', &(0x7f0000000580)=@random={'btrfs.', '(\x00'}, &(0x7f00000005c0)='trusted.', 0x8, 0x2) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fcntl$setsig(r0, 0xa, 0x27) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xd0, r2, 0x401, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xdd0}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf12}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x19c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x53edf42d8b6be383}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x5}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xd0}}, 0x4000000) 16:32:13 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66641441a18d54bd3d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = memfd_create(&(0x7f0000000000)='keyringvboxnet0%\x00', 0x0) write$selinux_user(r1, &(0x7f00000000c0)={'system_u:object_r:hald_dccm_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2f) read$FUSE(r0, &(0x7f0000005000), 0x1000) getpeername(r1, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000100)=0x80) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000840)=ANY=[@ANYBLOB="0000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0200000000000000fa08000000000000ff7f000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000200000000000000ff010000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f23bb711cb1d5b4cab9bf26d95c4a8e205dfc273872e4611ca065c07a5275d4f96cb96"]) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000340)={0x7, &(0x7f0000000180)=[{0xfffffffffffffa6f, 0x4, 0x9, 0x78}, {0x8, 0x20, 0x3, 0x2}, {0x1, 0x7ff, 0x44, 0x101}, {0x0, 0xd4ba, 0x8}, {0xffd8, 0x9, 0x1ff, 0x6}, {0xc8a, 0x3, 0x0, 0x542}, {0x81, 0x40, 0x7, 0x4}]}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030301b34303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x5369a8fbfe10bdc1) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0c0804bf11be1c2b13e03502a2ce9b72a247c1f6ef1b1d5dbf7041272fc78b3b92b4b7acab1c80b929b3281440dbda2440543b3821ba7dad95825842102de555c534da66c5b45cb1f9cbf54538ca2404a01716cb310b3e6df16276a2c88436bd79a05005ac2aee4745a55f1874ecade68b45044e0dbc8537d3610307e5e0549237c95892fb9dd27f061910f46776b1ad9dcba6506ea2ba1ddfe683e3cc3129858cd751e37a9c66"]) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x1015, 0x1) 16:32:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642ef11e0a4d026de4cd2e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000003000)="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", &(0x7f0000000200)=""/121}, 0x18) 16:32:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x50) gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@empty, r2}, 0x14) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES16=r3, @ANYRESDEC=0x0, @ANYBLOB="2cf4"]) sendfile(r0, r3, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x400000000, 0x3}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000280)=0xc0000000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x6) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000480)=""/184) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="747275737465642e736563757269742de5b7892ab5a74ef8fedc0bce030f971da4de21500f278e43263585fd9b"], &(0x7f0000000f80)=""/210, 0xd2) clock_gettime(0x7, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x8, 0x4004, 0x832, 0x7ff, 0x5, 0x6}}, 0x50) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) r7 = getgid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000740)='trusted.overlay.upper\x00', &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1015, 0x3) write$FUSE_ENTRY(r0, &(0x7f0000000640)={0x90, 0x0, 0x6, {0x6, 0x2, 0x80d, 0x7, 0x40, 0x1, {0x2, 0xc140, 0x4, 0x200, 0x8, 0x40, 0x9, 0x240000000000, 0x6, 0x2, 0x62f8128a, r6, r7, 0x0, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10001, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) socket$nl_route(0x10, 0x3, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000340)=0x0) getgroups(0x1, &(0x7f0000000380)=[0x0]) getresuid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x10800, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c67726f75703ee8febf", @ANYRESDEC=r3, @ANYBLOB=',default_permissions,allow_other,obj_type=$md5sumem0)wlan0eth1-,euid<', @ANYRESDEC=r4, @ANYBLOB="2c636f6e746578743d73797361646d5f752c7375626a5f726f6c653d7d2c736d61636b66736465663d5d21a16c6f7b7d282670707030776c616e31757365722d2c00"]) 16:32:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:apt_lock_t:s0\x00', 0x20, 0x3) 16:32:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000002c0)='logon\x00', &(0x7f0000000340)='.$cpusetZ$\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) signalfd4(r1, &(0x7f0000000080)={0x1}, 0x8, 0x80000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x100) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r2) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @loopback}, {0x306}, 0x0, {0x2, 0x4e20, @multicast2}, 'syzkaller1\x00'}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="ec1c90b418b0754743dc3b627aba00ed66013d", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x8, 0x0, 0x9, 0x6, 0x0, 0x9, 0x200, 0x0, 0x0, 0x6a4b, 0xffffffffffffffff, 0x1, 0x6, 0x4, 0x3, 0x4, 0x80000000, 0x1, 0xfffffffffffff53e, 0x39, 0x1, 0x9, 0x7, 0x6, 0x3ac, 0xab2b, 0xbd35, 0x4, 0x8, 0x1, 0x101, 0x9, 0x7, 0x6, 0xb6, 0x200, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x5}, 0x6000, 0x40, 0x2, 0x7, 0x9, 0x800000, 0x7fffffff}, r0, 0xc, r1, 0x9) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030301962b236824e02572a30303430303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 16:32:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=""/140, 0x8c) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303011303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:14 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r1, @ANYRESOCT=0x0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="01002f51aa837f1815cfe1fbe15b57ebf54d414b70c58be007dca9c3db143229596cdd642c49e86dc3050e07b6e11f9836367ddcd0f6828e66128adea38f10124eaf1ce55f271cd19ed174119b3a622b9eaa4e0f10ab168415e022ca4ccad051b74a5063d9a0ebe4f9693d325630f400c103ad5a4be6ae110fce4ebab4a0e2250c09b5db4bc4bbf955578f09fa7a8bf74007497a4c5fc4d08aea1007b3101789bb55893e"]) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) write$uinput_user_dev(r0, &(0x7f0000000700)={'syz0\x00', {0x2d0, 0x8001, 0x2000000000, 0x81}, 0xc, [0x8, 0x5, 0xfffffffffffffffe, 0x3ec, 0x8001, 0x3f, 0x7d4dd73d, 0x1ff, 0x2a5, 0x8b9, 0xffffffffffffffff, 0x7, 0x7ff, 0x1, 0x3, 0x0, 0xbbd9, 0x1, 0x7, 0x0, 0x0, 0x4, 0x6, 0x6, 0xfffffffffffffff7, 0x5, 0x2, 0x2, 0x5, 0xff, 0xffffffff, 0x5, 0x3, 0x0, 0xb8, 0x8000, 0x9, 0x80000001, 0x1000, 0x7, 0x2, 0x9, 0x80000001, 0x100000001, 0x8, 0x668, 0x72a, 0x6, 0x0, 0xb87, 0x6, 0xffff, 0x6, 0x8a, 0x2, 0x1000, 0x6, 0x5, 0x3, 0x3, 0xd700, 0x0, 0x3, 0x8], [0x9, 0x1, 0x9, 0x10001, 0x1, 0x4aab, 0x0, 0x7f, 0x8, 0x4, 0x3, 0x7, 0x1, 0x6, 0x8, 0x0, 0xfffffffffffffc01, 0x4, 0x8, 0x4b7c58b8, 0x8000, 0x100, 0x6, 0x5, 0x8000, 0x4, 0x7, 0x5, 0x8, 0x3, 0xd87, 0x7, 0x9, 0x7, 0x551d, 0x4, 0x4, 0x400, 0x7f, 0x0, 0x1, 0x7, 0x9, 0x6, 0xfffffffffffffff8, 0x7, 0x5f7e, 0x8000, 0x7, 0x7a1c9e20, 0x7f, 0xeabe, 0x8000, 0x7, 0x1, 0x4, 0x4, 0xff, 0x9, 0x2, 0xe691, 0xfffffffffffffffa, 0x3, 0x5], [0x3, 0x7, 0xff, 0xd10, 0x63dc, 0xcb5, 0x7, 0xaa, 0x3, 0xffff, 0x6, 0x7f, 0x0, 0x4, 0xdf, 0x70000, 0x1, 0x200, 0xc7b2, 0xd5f, 0x0, 0xf3, 0x0, 0x100, 0x4, 0x1d18, 0xa000000000000000, 0x2, 0x0, 0xac, 0x1a8f, 0xffffffffffffff00, 0x7, 0x9, 0x100, 0xffffffffffffc16f, 0x931, 0x24, 0x4, 0x7fff, 0x6, 0x56e, 0x1000, 0x8, 0x3, 0x800, 0x6, 0x4, 0xc99, 0x6, 0x2, 0x7, 0x8000, 0x800, 0x9, 0x0, 0x6, 0x1, 0x10000, 0x7, 0x6, 0x8, 0x6, 0x40], [0x8, 0x9, 0x9d, 0x7f, 0x0, 0x5, 0x5, 0x200, 0x8, 0x3, 0x8, 0x8, 0x5, 0x65, 0xffffffff80000000, 0x41, 0x0, 0x80000000, 0x5, 0x37, 0x3, 0x987, 0x16, 0x7fff, 0x2, 0x9dab, 0x0, 0x10001, 0x5, 0x9, 0x4, 0x7ff, 0x1, 0x0, 0x9, 0x1d5b, 0x3ff, 0x656bcc6, 0x0, 0x8, 0x10001, 0x40, 0x400, 0x100000000, 0xfff, 0x8, 0x8ad, 0x8, 0xab, 0x800, 0x101, 0x8, 0x1, 0xfff, 0x6, 0xffffffff, 0x8c, 0x1ff, 0x7, 0x2, 0x1, 0x8, 0xccf, 0x81]}, 0x45c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x6) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="008000000000000000afd0547deb0000"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) [ 660.926338] audit: type=1400 audit(1544113934.719:38): avc: denied { associate } for pid=25877 comm="syz-executor2" name="fuse" dev="devtmpfs" ino=4690 scontext=system_u:object_r:apt_lock_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 16:32:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000000}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3d000000000000000000530ea097c1f664b63cd2e9e9924b101f02606ad399dd353206353a2edf76ef6fe9ccade99104213eea5f705a8410e29feb0ce7d82e145ea131e3a4965427a184ce86e6f9d37199cbaf6da258e8df2fa5a08d1313d3b288049b68b2f1acf5601c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000100)="ba71578a6c5077996e5c8f1fb98c0897d2a9e0f67de7d38ba71520686ad76e847664c0a0c4b285068b0e9a77d7f5f44155aecbec5f0248c0ad1e", 0x3a) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x7}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000006000), 0xfffffffffffffe4a) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d82d62dca3ac96d56ab1c87f4b7b7b5bbd9e7a0c878debae6232cd77a050b09e6d15117f108", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/relabel\x00', 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r3, r4) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100), 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000080)=0x8, 0x4) recvmsg(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2000) sendmmsg(r3, &(0x7f00000000c0), 0x182, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f6404e0c042f3146436f1653d3030303030303030303030303030302fff872cdee25d2fffff4ff95c7e30303034303030312c758f9b1b3808", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x30d) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) write$nbd(r0, &(0x7f0000000340)={0x67446698, 0x0, 0x1, 0x2, 0x2, "894b995b7891fe9d05b65eae4c6d0de9b885b4c1a9dd9635c54536a21d3b0667075a5d01e0cd97e01d59e06ecf6fbc64b236cec6c8f3d413083c0a44b00922aaf1cdc382ff2e9b72b1a6bf5190ea9f05168d6d6291ae86ff462676487dcec8fb0e11d9457702daed59aae98e5ce9f30038a233958770bccc77769f9f7f79626ae89c188d4654c3c8994cd52812b27dd0a856e15335df17c6299fccdec735ca37667b34867c076d54129c4ffec54c3eec4eb98b58902e28c1979535e3a0ae07da63327934c50600dcd9cc2b4110441e22d1dbd5b48348c22f2251c26868afb16fcd447c64beb9460019c635"}, 0xfb) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x13a) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="0c796f6f746d6f64653d30303030303030303030303030303030307034303030c35a3830a706a5e31a86f804c72aea262c10b4984f93c6d8070000000000000084757365745f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000580)=""/221) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x2, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='trust\x00\x00\x00\x00ecurity.dvm\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:15 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x3) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @local}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@local, 0x74, r2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:16 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='system.sockprotoname\x00') flistxattr(r0, &(0x7f0000000280)=""/101, 0x65) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rfcomm\x00') mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67727bc760bc386f7570baa7dc9dca1435dd8ebeb7ac11190c721b7650006b9843d4f3d6563b0bc0ea8ca70f3387bff542b48c550ed9a6102812c1ff626f8c215d6ad50da795916941df549e7ff88640081462ab4fca1091f2d59e0a41c039692ad10cfc29754b91153def3e5d1e3a5734b4d6e83406dd47c755067d9397888c3486c2c9ff1e2898644756930bea6a4a32de53e65b3b95000000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', '/dev/fuse\x00'}, &(0x7f0000000f80)=""/210, 0x47e) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642e736574792e65946d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f0000000100)) timerfd_settime(r0, 0x1, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x7, 0x0, 0x0, 0x1}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:16 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x1, {0x200000000000000}}, 0x18) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x404}, 0xffffffffffffffd2) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) accept4(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80, 0x800) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:16 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr$security_ima(r1, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "14c55f954fd0ac8333925ec5ef6995a0b5eac219"}, 0x15, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:16 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x40000, &(0x7f0000000580)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@seclabel='seclabel'}, {@subj_user={'subj_user'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@audit='audit'}, {@fowner_gt={'fowner>', r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1-(,,]-self'}}, {@obj_role={'obj_role', 0x3d, "6367726f75703a2a02766d6e6574312d"}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/fuse\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+_'}}]}}) 16:32:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0xfffffffffffffff9, @loopback, 0x401}, 0x1c) 16:32:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x541a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0xa, 0x7f) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='./file0\x00') r2 = dup(r1) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) openat$cgroup_ro(r2, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80003) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000001540)=[&(0x7f0000000280)={0x0, 0x4000000000000000, 0xf0000000000000, 0x1, 0x30}]) personality(0x8) syz_genetlink_get_family_id$ipvs(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x8000fffffffe) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275739565642e73656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r4, &(0x7f0000002000), 0x120f) read$FUSE(r4, &(0x7f0000003000), 0x1000) fstatfs(r4, &(0x7f0000000480)=""/117) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0xff, 0x0, 0x0, 0x4, 0x10000}}, 0x50) write$FUSE_INTERRUPT(r4, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x2100, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 16:32:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:17 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2d717cf18ef2fef5ee69d056c110e5cf01bec7ff1466e7bf2a2bcf4ab9422525e80402f199ddf802d1ce1053114f9fb8608e35c9ecc653c5faadd1ffc58b0952c25df746ce81bd67623105872edac8da9bed35bd32ad828d72cf5f2b589208b553ae9c3b10c40c3ee248506114d6a48014660709cf193b45ab6766dcd190771df57d7133d101e1978f096b60af1c248eda65d6377a9ab19bf097baae573a8731e3044a2e54876fc56a346f02aa3c2ac9a14c5379b9da102439a5a08f50"]) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) write$P9_RFSYNC(r0, &(0x7f0000000140)={0x7, 0x33, 0x1}, 0x7) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "f1fdbfdfbf73e335e3bd7087b2619ad1"}, 0x11, 0x3) 16:32:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(r0, 0x40049409, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0336815ae7a9ea0a29aacc9f580bad33fbbeb1535c4eb22b1d46652a34861cd9146c974ae64d75fe30b52d78aa8b37b399d5b8fb2cd2574875913986a147a61d24d1d48b9f4cb236269873a42e3562f72075bf0dabba6c5c7dd6bb69dc74903f817926322d3ee6a0bf25ae0e66891ffe72db91a9f269a3e5b98fea6054d6f3324f98fd0c31c0381d1af5bcc6b5d888650bbd03a004071bff4f9cc594d505f0d3136e88029156f5775f4544c80592bb142bc82c9350f971", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) unlinkat(r3, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KIOCSOUND(r3, 0x4b2f, 0x7fffffff) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.evm\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:17 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000340)=""/235, 0xeb) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0xfffffffffffffffe, 0x2, {0x0, 0x4, 0xbfa}}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67050000004969643c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x141102, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 16:32:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) gettid() clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x7ff, 0x1, 0x0, 0x2, 0x1, 0x9, 0xfffffffffffffffc}, &(0x7f00000000c0)={0xffffffffffff8000, 0x8, 0x7, 0x24, 0x3, 0x80000000, 0x4, 0x7ff}, &(0x7f0000000100)={0x7, 0x2, 0x1, 0x8000, 0x5, 0xfff, 0x91, 0x1c}, &(0x7f0000000200)={r1, r2+10000000}, &(0x7f0000000340)={&(0x7f0000000240)={0x1}, 0x8}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:17 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0x6, &(0x7f0000000100)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1be7da77}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000001}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x44, &(0x7f0000000280)=""/68, 0x41100, 0x1, [], r0, 0xd}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:17 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:17 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount(&(0x7f0000000340)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='aufs\x00', 0x40000, &(0x7f0000000400)='fd') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000440)={0x2000003, 0xe4}) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="68000000290200018000000201000000000000000000000000000000000000f1e5000807002e2f66696c65300002000000050000000000000006000000000000003407002e2f66696c65300802000000050000000000000030c70010000000000107002e2f66696c653022a6995f3b0b76cf9fa2c04a83fe59890759c9df6e26165c46e48c9d6911ebe80795d7662b301fe8fb7adac044c5c698f3b0530f8a4283ef5c8711368e2b25f61c5659fb8ce157e41393b966140000"], 0x68) timer_create(0x3, &(0x7f0000000280)={0x0, 0x2e, 0x5, @tid=0xffffffffffffffff}, &(0x7f00000002c0)=0x0) fcntl$dupfd(r2, 0x406, r1) timer_delete(r3) 16:32:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="02643d3b520f70a345291488f30d602be27a86d7eab212b6a9852698cf8e1a89d750ff5309f0f85450f58b2f91925262e3407a81eb0940fa64f7020bc6eaa9529c2e07062ed4c9b01ef4b2eea7290c4ee364", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x2, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other='allow_other'}, {@blksize={'blksize'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vmnet1)'}}, {@fsname={'fsname', 0x3d, 'system['}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp1^'}}]}}) 16:32:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x6) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66743dcfbdc6e0585b8fa28b1e1ba3ea17593c92a9f46ca9b5ca7a49949290cdc029286f994b04c713d1ccaa6cf2106a5892fa36e87b5a1ae9ec228c02768858a204b19d0929d7624ecde7cff6e954e85c9694ddd5df952321c53250c2fc6cf53b92cea894ec02c326f2f2f43e360691de78102696c37ef749fb483e070628361dfc8c8848d5910c40181c3420c5ee0831d0be068cfa59169993a6531fa5c75f905d7af32dcfc97db0cedf0ccd5e9145d14be2384ad903fe5f9a3972b1a109a18109184f6d32e223e31000403a77e5510db677b6179dcf2457270d25", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000580)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20101, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e22, 0x694, @remote, 0x6}, {0xa, 0x4e20, 0xfff, @ipv4={[], [], @loopback}, 0xfe3}, 0x0, [0x401, 0xf7, 0x7f, 0xe3f0, 0x1ff, 0x1, 0x5, 0x9]}, 0x5c) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'yam0\x00', r3}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e24, 0x81, @mcast1, 0x8}, {0xa, 0x4e20, 0x0, @mcast1, 0x6}, 0x7ff, [0x0, 0xf7, 0x8, 0x2, 0x7f, 0x1, 0x9c, 0x1]}, 0x5c) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x0, 'rdma'}, {0x2d, 'rdma'}, {0x2d, 'memory'}]}, 0x14) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='exofs\x00', 0x0, &(0x7f0000000440)='proctrusted,cpusetkeyring+)procwlan0eth0\x00') splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 4: pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = dup2(r1, r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fadvise64(r1, 0x0, 0x3, 0x7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66b1995e0bdd895adf5e1a69f95b72af3d492465569313d00452f166c3117cd3c56d9426bf97d8824cd4f2e6141e168925834dbb625671af55a9a2629a6d74253a3cb9ed058383a9bcbc02c37acec54161a5020f207d29c7fc868159242137e791bd9bdd9a9c0ed7f075e358d9522929ba200f8d", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000140)={0x20, 0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0xfffffffffffffffc}}, 0x20) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000080)={{0x21, @local, 0x4e22, 0x3, 'sh\x00', 0xc, 0x4, 0x16}, {@local, 0x4e22, 0x2000, 0x268, 0xfffffffffffff6a4, 0xfffffffffffffffd}}, 0x44) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x200, 0x0) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x30000, 0x100) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x16f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') read$FUSE(r1, &(0x7f0000004000), 0x1000) read$FUSE(r1, &(0x7f0000005000), 0x1000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="7ba10000000089b5863dadaeb2076b40fb9ba944f03de830c242abddabe01e47151c3a197fe5cbc6f1da5092df00aca26ff75964b1b12627131b80588a06239e8e6f87112f84b2b016319521264f7fcadc7065c64b0c05b262d4d9ecef61fbc8c9512a8bdf06e6a8286d6f1a9dce429d0f663e30c561d7dac26a65ef15a116389e5fb70932e456dfc13cb9cbe82fc7271dccbe148dd8cdfce01f85f3d87c2502d6441d000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup2(r0, r0) read$eventfd(r1, &(0x7f0000000000), 0x8) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465642e73656375726974792e65766d00a0a165d0a6b6e83972236a8ebdefa1741f28bbcc57ff2cf202ac03789053bcef589748c8351a8a48dad49f28e0ccdb545346d2146379d93d964b35bb3dce429ff4f3c7516ca7e3c3cf92a39a04c7133a0403de1241faf380a0814ca32e5100f75601c979d8c77a473bd7"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rity.'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0xfffffffffffffffe, 0x6, {0x0, 0x1}}, 0x20) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0xfffffffffffffffe) 16:32:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="7407000000400000007663757257631ce8f1ddf20e52eb75bc1302cf628e74792e65766d8a"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1c, 0x4) 16:32:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x90880, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0xa7a, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0x20) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000140)=0xe8) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000001c0)={0xff, 0x1ff, 0x400}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCSBRK(r0, 0x5427) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:32:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030643d4151f503d7863ddf25bba5ca459529c001814c863dbdd20b0bc576c0b98b832443b4cd268fd8e35efa519e8f6baef0a3ece208441e56e1462d230c29162ea2d959ac6e776c81c58a634fdefb6d74c3ec2c45607c008da5510b0372e09eb18fe75fba3a0b1ec1", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x40, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x2a, 0x0, 0xfffffffffffffff9, 0x2, 0x4984, 0x2, "fa9862fb6fd2fe3b587515ff474be62b9c20b5409f647753bc3b5b3cc57023095bd85e691296644febd3"}, 0x142) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_GETXATTR(r0, &(0x7f0000000440)={0x18, 0x0, 0x8, {0x69db}}, 0x18) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101000, 0x0) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)=@ipv6_getnetconf={0x14, 0x52, 0x10, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x850}, 0x90) r3 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000600)={0x21, 0x3, 0x0, {0x6}}, 0x21) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0xdc, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000480)=""/220}, &(0x7f0000000100)=0x78) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c2fee65835078845a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) 16:32:19 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffc000/0x1000)=nil) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r1, &(0x7f00000000c0)=@hci, &(0x7f0000000000)=0x80) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x541a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0xa, 0x7f) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='./file0\x00') r2 = dup(r1) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) openat$cgroup_ro(r2, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80003) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000001540)=[&(0x7f0000000280)={0x0, 0x4000000000000000, 0xf0000000000000, 0x1, 0x30}]) personality(0x8) syz_genetlink_get_family_id$ipvs(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x8000fffffffe) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275739565642e73656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r4, &(0x7f0000002000), 0x120f) read$FUSE(r4, &(0x7f0000003000), 0x1000) fstatfs(r4, &(0x7f0000000480)=""/117) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0xff, 0x0, 0x0, 0x4, 0x10000}}, 0x50) write$FUSE_INTERRUPT(r4, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x2100, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 16:32:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0xa, 0x4, 0x941) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r2 = dup3(r0, r0, 0x80000) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000000)={0x7, 0x3, 0x10000, 0x31, 0x7, 0xffffffffffffffaf}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x1}, 0xfffffffffffffe59) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x541a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0xa, 0x7f) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='./file0\x00') r2 = dup(r1) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) openat$cgroup_ro(r2, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80003) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000001540)=[&(0x7f0000000280)={0x0, 0x4000000000000000, 0xf0000000000000, 0x1, 0x30}]) personality(0x8) syz_genetlink_get_family_id$ipvs(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x8000fffffffe) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275739565642e73656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r4, &(0x7f0000002000), 0x120f) read$FUSE(r4, &(0x7f0000003000), 0x1000) fstatfs(r4, &(0x7f0000000480)=""/117) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0xff, 0x0, 0x0, 0x4, 0x10000}}, 0x50) write$FUSE_INTERRUPT(r4, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x2100, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x541a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0xa, 0x7f) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='./file0\x00') r2 = dup(r1) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) openat$cgroup_ro(r2, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80003) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000001540)=[&(0x7f0000000280)={0x0, 0x4000000000000000, 0xf0000000000000, 0x1, 0x30}]) personality(0x8) syz_genetlink_get_family_id$ipvs(0x0) sendfile(r1, r3, &(0x7f0000000080), 0x8000fffffffe) recvmmsg(r2, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275739565642e73656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r4, &(0x7f0000002000), 0x120f) read$FUSE(r4, &(0x7f0000003000), 0x1000) fstatfs(r4, &(0x7f0000000480)=""/117) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0xff, 0x0, 0x0, 0x4, 0x10000}}, 0x50) write$FUSE_INTERRUPT(r4, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x2100, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @local}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@local, 0x74, r2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @local}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@local, 0x74, r2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @local}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@local, 0x74, r2}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x200, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x7, {0x0, 0x6}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000003000), 0x1000) accept4(r0, &(0x7f0000000900)=@hci={0x1f, 0x0}, &(0x7f0000000980)=0x80, 0x80800) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000009c0)=r2) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000700)=""/191) r5 = getgid() fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x100000, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x77, 0x37, 0x38, 0x32, 0x34, 0x64, 0x7f], 0x2d, [0x38, 0x35, 0x7b, 0x35], 0x2d, [0x62, 0x73, 0x36, 0x33], 0x2d, [0x35, 0x35, 0x36, 0x39], 0x2d, [0x64, 0x0, 0x61, 0x33, 0x7f, 0x66, 0x62, 0x35]}}}, {@euid_eq={'euid', 0x3d, r6}}, {@seclabel='seclabel'}, {@hash='hash'}]}}) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x3, 0x4, 0x8, 0x9, 0x3, 0x3e, 0x1f, 0x2c, 0x38, 0x377, 0x2b0f, 0xb, 0x20, 0x2, 0x6, 0xffffffffffffffff, 0xfff}, [{0x6474e557, 0x1, 0xfff, 0x3ff, 0x482f, 0x3a, 0x1, 0xffff}], "3fc182471984ec1b99f2245d600a20b097904050f286e6f8a4372e4755fe292c", [[]]}, 0x178) accept4$packet(r3, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000880)=0x14, 0x800) recvfrom$packet(r3, &(0x7f0000000800)=""/41, 0x29, 0x40, &(0x7f00000008c0)={0x11, 0xf7, r7, 0x1, 0x777, 0x6, @dev={[], 0x18}}, 0x14) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) accept$packet(r1, 0x0, &(0x7f0000000000)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000480)=""/184) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="747275737465642e736563757269742de5b7892ab5a74ef8fedc0bce030f971da4de21500f278e43263585fd9b"], &(0x7f0000000f80)=""/210, 0xd2) clock_gettime(0x7, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x8, 0x4004, 0x832, 0x7ff, 0x5, 0x6}}, 0x50) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) r7 = getgid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000740)='trusted.overlay.upper\x00', &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1015, 0x3) write$FUSE_ENTRY(r0, &(0x7f0000000640)={0x90, 0x0, 0x6, {0x6, 0x2, 0x80d, 0x7, 0x40, 0x1, {0x2, 0xc140, 0x4, 0x200, 0x8, 0x40, 0x9, 0x240000000000, 0x6, 0x2, 0x62f8128a, r6, r7, 0x0, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='trusted.security.Fvm\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='rit'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000480)=""/184) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="747275737465642e736563757269742de5b7892ab5a74ef8fedc0bce030f971da4de21500f278e43263585fd9b"], &(0x7f0000000f80)=""/210, 0xd2) clock_gettime(0x7, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x8, 0x4004, 0x832, 0x7ff, 0x5, 0x6}}, 0x50) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) r7 = getgid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000740)='trusted.overlay.upper\x00', &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1015, 0x3) write$FUSE_ENTRY(r0, &(0x7f0000000640)={0x90, 0x0, 0x6, {0x6, 0x2, 0x80d, 0x7, 0x40, 0x1, {0x2, 0xc140, 0x4, 0x200, 0x8, 0x40, 0x9, 0x240000000000, 0x6, 0x2, 0x62f8128a, r6, r7, 0x0, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000480)=""/184) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="747275737465642e736563757269742de5b7892ab5a74ef8fedc0bce030f971da4de21500f278e43263585fd9b"], &(0x7f0000000f80)=""/210, 0xd2) clock_gettime(0x7, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x8, 0x4004, 0x832, 0x7ff, 0x5, 0x6}}, 0x50) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) r7 = getgid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000740)='trusted.overlay.upper\x00', &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1015, 0x3) write$FUSE_ENTRY(r0, &(0x7f0000000640)={0x90, 0x0, 0x6, {0x6, 0x2, 0x80d, 0x7, 0x40, 0x1, {0x2, 0xc140, 0x4, 0x200, 0x8, 0x40, 0x9, 0x240000000000, 0x6, 0x2, 0x62f8128a, r6, r7, 0x0, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x5369a8fbfe10bdc1) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x5369a8fbfe10bdc1) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000480)={0x5, {{0xa, 0x4e24, 0x5268df47, @mcast1, 0x4}}}, 0x88) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x5369a8fbfe10bdc1) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) accept$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000006c0)={0x80, 0x200, 0x3, 0xfff, 0x5, [{0x8001, 0x4e, 0x4}, {0x60, 0x3, 0x10000, 0x0, 0x0, 0x2008}, {0x0, 0x5, 0x9, 0x0, 0x0, 0x2000}, {0x8, 0x1000, 0x76, 0x0, 0x0, 0x100}, {0x80, 0xe0ba, 0x7, 0x0, 0x0, 0x80}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) r3 = fcntl$dupfd(r0, 0x406, r0) write$P9_RLINK(r3, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) chroot(&(0x7f0000000100)='./file1\x00') read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x4, 0x0, 0xeedb}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6f99720eb4305e11, 0x0) setxattr(&(0x7f0000000380)='./file2\x00', &(0x7f0000000580)=@random={'btrfs.', '(\x00'}, &(0x7f00000005c0)='trusted.', 0x8, 0x2) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fcntl$setsig(r0, 0xa, 0x27) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xd0, r2, 0x401, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xdd0}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf12}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x19c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x53edf42d8b6be383}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x5}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xd0}}, 0x4000000) 16:32:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x2}}, 0x20) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x4}, 0x28, 0x3) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) chroot(&(0x7f0000000100)='./file1\x00') read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x4, 0x0, 0xeedb}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6f99720eb4305e11, 0x0) setxattr(&(0x7f0000000380)='./file2\x00', &(0x7f0000000580)=@random={'btrfs.', '(\x00'}, &(0x7f00000005c0)='trusted.', 0x8, 0x2) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fcntl$setsig(r0, 0xa, 0x27) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xd0, r2, 0x401, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xdd0}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf12}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x19c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x53edf42d8b6be383}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x5}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xd0}}, 0x4000000) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) chroot(&(0x7f0000000100)='./file1\x00') read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x4, 0x0, 0xeedb}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6f99720eb4305e11, 0x0) setxattr(&(0x7f0000000380)='./file2\x00', &(0x7f0000000580)=@random={'btrfs.', '(\x00'}, &(0x7f00000005c0)='trusted.', 0x8, 0x2) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fcntl$setsig(r0, 0xa, 0x27) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xd0, r2, 0x401, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xdd0}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf12}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x19c}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x53edf42d8b6be383}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x5}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0xd0}}, 0x4000000) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x20) ppoll(&(0x7f00000000c0)=[{r0, 0x8011}, {r0, 0x400}, {r0, 0x1004}, {r0, 0x2}], 0x4, &(0x7f0000000100), &(0x7f0000000180)={0x3ac8}, 0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x794000000}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x3, {0x7, 0x1c, 0xd847, 0x101, 0x10000000000, 0x0, 0x4}}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x20) ppoll(&(0x7f00000000c0)=[{r0, 0x8011}, {r0, 0x400}, {r0, 0x1004}, {r0, 0x2}], 0x4, &(0x7f0000000100), &(0x7f0000000180)={0x3ac8}, 0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x794000000}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xe9dc5e35aacd7206, 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000003000), 0x5a3) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x20) ppoll(&(0x7f00000000c0)=[{r0, 0x8011}, {r0, 0x400}, {r0, 0x1004}, {r0, 0x2}], 0x4, &(0x7f0000000100), &(0x7f0000000180)={0x3ac8}, 0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x794000000}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x2c, 0x2, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_gettime(r0, &(0x7f0000000100)) creat(0x0, 0x0) 16:32:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000200)={'security\x00', 0x2, [{}, {}]}, 0x48) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0xf) 16:32:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="748175737465400000006375726974792e65766d003463bc2b10ac06397c2a2a4b8b91e92a86845edc5cb4fc1fb809aab0f93c2dedb4df5202ce95755f0c92d29d42dd9a0e62926885c6c01a01362b7850fea339645d21eccd8d06b5991990162da2a80e3e3ff917"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x50000002) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x20) 16:32:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='task\x00') getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x881010, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@smackfsroot={'smackfsroot', 0x3d, '%)user!'}}, {@audit='audit'}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, 'task\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@dont_hash='dont_hash'}, {@uid_eq={'uid', 0x3d, r5}}, {@hash='hash'}, {@uid_lt={'uid<', r6}}]}}) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) fallocate(r1, 0x41, 0x7fffffff, 0x31a5) munlockall() ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x58, 0xfffffffffffffff5, 0x4, [{0x6, 0x7, 0x2, 0x2, 'fd'}, {0x3, 0x760, 0xc, 0x8000, '-selinuxeth0'}]}, 0x58) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x20}}, 0x4000080) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@uid_lt={'uid<', r1}}, {@smackfshat={'smackfshat', 0x3d, 'user_id'}}, {@subj_role={'subj_role', 0x3d, "ee"}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737465642e73656375726974792e65766d001eb63a57914472dff8017efb07d29937475279d4bfec036d4577ba7953554058f44be2a84df915630f28eeeb1cfca04ad1f13954afb06a434cc8d65e1fcb000000000000000000000000"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() vmsplice(r0, &(0x7f0000000640)=[{&(0x7f0000000580)="e9f32135fe78f90406021fe7360246a61f981aed6e76e8249c592669df98e7e6e4650afd5d590ef32ef6fab1b3689a9b59fc907b90180f6026fb50356d56fd44ca25321186b054e59e332f0596d440e26075fcb40fe37b583ac4a5fc616c49be328dde10d07b88fc7df9af2e32dedb54e78ef785de873bc55bc43406e7eb5b323cab503533df7c26cbec868f0c72036e1d3058ed55ff19df46c950e0145b22b814", 0xa1}, {&(0x7f0000000340)="894952f0a2d66b005dc2d9a5780225c5e65eecde56c10eb71f0cd38630c7fa5f437c8437e3dacd1f21009c04fc2407adb13491d323cfcc0b31bb11f652201223e13c712cb5742b5f81d594fa8bdebfee7c7f82aa", 0x54}, {&(0x7f0000000400)="8729eac4596081d5912760687e1dc9e2794035c3f2280923200827f072fb799feedd2cfac85b685d1083123470be315e7d9be74e0a567bb836628f226f707e363ce9", 0x42}, {&(0x7f0000003000)="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", 0x1000}], 0x4, 0xc) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 4: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='personality\x00') munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 16:32:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100) creat(0x0, 0x7) 16:32:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x20010c0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r1, @ANYBLOB="647bdf513b78bf36c2e62c3db65ab2246af4ddda1e563eb46498a347eb9f2aec70d3b3bfb9adf3230b0e82695fdb06", @ANYRESDEC=r2, @ANYBLOB=',allow_other,pcr=00000000000000000051,\x00']) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r3, &(0x7f0000002000), 0x120f) read$FUSE(r3, &(0x7f0000005000), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r3, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x20) getsockopt$inet6_buf(r1, 0x29, 0x3, &(0x7f0000003000)=""/4096, &(0x7f0000000180)=0x1000) 16:32:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642e7365637552765c99d16a6009"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup3(r0, r0, 0x80000) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'gre0\x00', 0xffff}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cb48a0e18fa0bc1683d4615093c3efe7215dcceda6ad4522866970997f49ebd6ac0fa8a6a9431a0c17661e4c438d573b69eba76ed9fe7ece92256c74e3089a6855ea0bbaa945b4742d1e81d07ab94a2c078083d69267720cbb33db4fc025aece847136cf0b2686213841515af2e503ff7517608f50c4f68b943bce79712224de55c78df266d478091225bc8236cdfb5cda474d51c75c4fb", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="66643de255628d661170e48527121e7466de549a810660e574f4afcb419204a211de2f19b890033d93f4891830920ec9a59256c9a3ba56d2c88ec3c0479602a685e6323008b2141057a92e3994a36fc4e265e8257f47dec05041b05e4a4de072ac4b0d690a7f6810a89b6563ec838dc81f00de28a09dc43285a88ead37", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="45da2574d07e719c0000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465640600656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x2}, 0x8) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="ddcfa609633dc5d7b8e42623f83543218920f35a42f2494c26c35767d4e77975678b04cedcbbefff7726bd3221a13bb3559f2ab9ac4e6f547427264d4f73dee0909611f01339a9eb5c294e43886d02d5e73b3ba8e4b6d06135f21dee0d3289ec81400dad2b9537dc4f7baba95abeee87d880be0e2922cd9a461f13bcfd1accda6ae2ea43f59f59b4567a87ba7068ebd4256f23e6e05f5d5377800699ad494cf8a00b3c3d38cf0797182d2cecb467d44cda9fe1f0738c7886", 0xb8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') sendfile(r1, r2, 0x0, 0x800000080000002) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x4, 0x46, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f00000000c0)=""/70}, &(0x7f00000001c0)=0x78) prctl$PR_SET_UNALIGN(0x6, 0x3) chdir(&(0x7f00000002c0)='./file0\x00') chmod(&(0x7f0000000300)='./file0\x00', 0x21) 16:32:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) socket(0x2, 0xa, 0xfffffffffffffff7) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 16:32:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) 16:32:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="2a57feebf228fcb98753ba520219477ba7715981969d2e999bcb0c21989b2df682225ef9197b83c5534740db8ab8cf5ef04472b5a4410788c327", @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="29ab894ca8fe4ed8800337cd2720127f24b311dc3e36dbe49d17122b57799ad0634567a611f7cd811a6de69e5fc22bb8b8aec0a01a53b5a8c5eda4ba9ad4"], @ANYRES16=r0, @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYRES32=r0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRESOCT, @ANYRES16=r0], @ANYBLOB="c985dc9cd25578ccc8fc8d3678925d2f19ed40973077452c6e05f8030b6274777abd70dcedb8c5b2229675187ccf56d3f4597b99ffe56af80ff27156d9725e1e92b6dcb7f54d857adbc85707b68a686a8e319d3d46a78d623124979083a1c02e07311c4130dd61522b9ba6f22d05b84e5a30122f8ac13aa81d356b10d6b3ce0912703a00547f353daa8cf145f19fced3feb9348a", @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX=r0], @ANYRESOCT=r0, @ANYRESHEX=0x0], @ANYRESOCT, @ANYRES16=r0, @ANYRESOCT=r0], &(0x7f00000007c0)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000540)={0x5, 0x6, 0x5, 0x4, 0x6, [{0x6, 0x3ff, 0x284e, 0x0, 0x0, 0xa}, {0x9, 0x80000000, 0x94cc, 0x0, 0x0, 0x80}, {0x6, 0xbcc, 0x6, 0x0, 0x0, 0x100}, {0x5, 0x3, 0x3ff, 0x0, 0x0, 0x401}, {0x3, 0x3, 0x4, 0x0, 0x0, 0x1}, {0xa2f, 0x10000, 0x5, 0x0, 0x0, 0x80}]}) r1 = dup(r0) getsockopt$inet_buf(r1, 0x0, 0x3e, &(0x7f0000000480)=""/187, &(0x7f0000000000)=0xbb) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r2 = dup3(r0, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c75726f75eb5f6b8770", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f00000000c0)=0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) 16:32:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='com.apple.system.Security\x00', &(0x7f0000000f80)=""/210, 0x444) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0xfb47c96f2bc2d32e, 0x1d, 0x5, "40562b14335306c6ca6f92d152b519d40d806f6ac723ae6f23b3edc629dcb0d534acc17355cb2f0a7a7e573bab0863a3f120013d6167accc1b0cdf83c0a2e662", "f0be7af5a966081f5520ab71550c7b69eb4ed43e1b38188d732642fce08273b9e2724db9d4976e1fb82bfcb0234be1377be86c57999cfceb896452e32bd71bd6", "fc2e3c5b8adf5660ceca47576256dc607536f359e2b1754b9b59c57816e0f5ad", [0x5e, 0x100000000]}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) pipe(&(0x7f0000000000)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c613486507e45c190aa0974e86530303030303f5e30304ee70e42ca30303000000000303030227ba78481b214bd69ef3377c2aeb284c2fc96febb483e0d58f527275306edf166577cf80a86d67248e2b9a259cdb4785b909bedea84d7c69c807a13fc5282e2eb06b1c2bf20885feec34527cac25a28c08f4a6e172f300844c72caaf819ec08cb327dac498da00fbcdbdadb61cef5c22e039d10de9d60f3ebd363d08181bda201083bfb7c32177f8fb9e3bff865d04326420d2726f6d6e6ada070be769214634a4813a219f9782d57b925766d1d4fd76e23805866460fe7", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="f35d238e47e2e80a2be5f25f9a737450642e74656375726974792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x6}, 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x0) gettid() r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000200)={{0x1, 0x3, 0x3, 0x2, 0x1}, 0x1, 0x8000}) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000180)={'dummy0\x00', {0x2, 0x4e22, @empty}}) 16:32:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x800, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x40) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r2 = fcntl$dupfd(r0, 0x406, r0) write$selinux_create(r2, &(0x7f00000000c0)=@access={'system_u:object_r:logrotate_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x100000001}, 0x60) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x20001, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000000)='./file0\x00', 0x4) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000000c0)=""/48) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000006000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677b6f75705f69643df83ad6bd0d634969d4e676753cf9b4d6c1af140f0ed756a345e542dd6072045a64d677d05b39142a893d5c9b6d0ca57714d1917276d19cd5e7cb1aa9282635f66b475dc298654de48deaa641158013d047b5e288ac66ebe4b505a0546d54ce3d1b75a8f594d1c7ba4bd588c2aa5a1bbbe87e31fa3944695a60a654a7732405880adcb3e01be72d8c4e46a8cb65ae5ab606400d966484966ce8a6a26d954238cf1fdf7d205b7a1fc2357a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x80) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0xd1, 0x2}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000f80)=""/210, 0xd2) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000140)=""/54) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x2}}, 0x30) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) 16:32:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x6, 0x1, 0x10001}}, 0x30) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000480)={0x1, {{0xa, 0x4e20, 0x0, @remote, 0x1}}, {{0xa, 0x4e20, 0x1f, @ipv4={[], [], @multicast2}, 0x7}}}, 0x108) 16:32:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x7}, 0x8) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) prctl$PR_GET_SECUREBITS(0x1b) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000000)="708a748b04af74479483bbd08acafc8a3f6bc857b40d1693b87dd1b8", 0x1c) 16:32:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(0xffffffffffffffff, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) fcntl$notify(r0, 0x402, 0x80000002) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x5, {0x7, 0x1c, 0x0, 0x0, 0x4, 0x7fff}}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x1, 0x1000000000000}]}, 0x14, 0x3) 16:32:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ff008032d914e1378d854e4fa9250f70a3f3a9cb2f4ece8fb9b6a9ade7e136633ae5936a0df614174ae04eae36c241a55694526beb38c5c89a726a01a3e7892ffca2ffe2deb979ea35d780e2"]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642e7365639870e63011d332d8f888"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="bd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0xfffffffffffffffe}, 0x2c) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = dup2(r0, r0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x3f1, 0x3}, 0xde) 16:32:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x9, 0x1, 0x4, 0x7fffffff, 0x1, 0x8}) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) 16:32:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x1ff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000007000), 0x1051) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='-\x00') perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x6, 0x9, 0x7ff, 0x6, 0x0, 0x101, 0x88024, 0x8, 0x372, 0xa9, 0x4018, 0x0, 0xffffffff, 0x40, 0x0, 0x3, 0x7, 0x8, 0x0, 0x40, 0x1d50, 0x80000001, 0x7, 0x4, 0x9, 0x6, 0x5, 0x9de2, 0xa9, 0x7fffffff, 0x0, 0x8001, 0x6, 0x1, 0x100000000, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0xc3}, 0x4180, 0x9, 0x2, 0x8, 0x1f, 0xfff, 0x6}, r1, 0x3, 0xffffffffffffffff, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="747275737465642e73656375726974dc15cebb2ea953aaf8a1792e65766d00"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) socketpair(0x1e, 0xa, 0x7ff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) chdir(&(0x7f00000000c0)='./file0\x00') 16:32:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7472751633ad5a6c68932c737465640b0c4afe53f61772e87c8977dde0"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x80, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@smackfshat={'smackfshat', 0x3d, '(-)cpuset+/'}}, {@obj_role={'obj_role', 0x3d, 'fd'}}, {@uid_gt={'uid>', r3}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r4}}]}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:24 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x8800, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@known='system.advise\x00', &(0x7f0000000480)=""/210, 0xd2) read$FUSE(r2, &(0x7f0000002000), 0x120f) read$FUSE(r2, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r2, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2e, 0x4, 0x0, {0x5, 0x2, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:25 executing program 3: creat(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='hfsplus\x00', 0x0, 0x0) 16:32:25 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2280, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0x3ed) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x4}}, 0xb) gettid() write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:25 executing program 3: 16:32:25 executing program 3: 16:32:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000340)=0x8) r1 = creat(0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000000c0)={0x8, 0x80000001, {0x57, 0x2, 0x200, {0x0, 0x6305}, {0x71, 0x1d81}, @rumble={0x6, 0xffff}}, {0x52, 0x9, 0x13f, {0x1, 0x800}, {0x180000000, 0xd69}, @rumble={0xd1, 0x3}}}) r2 = gettid() sendto(r1, &(0x7f0000000240)="cc6c303ba46ad1dbe9ce42ce62c5411bc4787ac1cfd03f0f5fb8058e7fda2631804ad6474b7028e19d3255e7a556536a5c3624bc631c19287d02db21bea1b3cf1bdadf40bc8983db8e68e0302aab3d73f023ac606fc4086df688", 0x5a, 0x4000080, &(0x7f00000002c0)=@in={0x2, 0x4e20, @remote}, 0x80) ptrace$setregset(0x4205, r2, 0x200, &(0x7f0000000000)={&(0x7f0000000140)="3d4dd67bc20633d75ddf9392be6fb647fe7f2b1a214bad6edbb2a9f3986df5a76c5360e0f4f94d5db206a8128b991ec0ae18da61b7581b98defbf52b0ab34d4ce943b3f939f53df0129270cdab7ad2b17817e0481b3a615d5bf8c52eda4807528ab01e73eeabd0e76783b295f14162231788f67d332d80745eaf97059d5548713ac1681454ece7ade56e7617685f1443c970f64c878872232b1cf76600c4877e36bf2a0a420714f544048afc3a862236a636d33cd7873523fca4ab98a413c2a128c67b6ed1ee6b525845e5f052de", 0xce}) madvise(&(0x7f0000e9b000/0x1000)=nil, 0x1000, 0x1e) 16:32:25 executing program 3: 16:32:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:25 executing program 3: 16:32:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030e530acdb8eca6dc4fe6209e0494347e89cff303030303030303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) umount2(&(0x7f0000000000)='./file0\x00', 0x5) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) open(&(0x7f00000000c0)='./file0\x00', 0x80002, 0x4) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000100)={0x10, 0x2, 0x2}, 0x2cb) 16:32:25 executing program 3: 16:32:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) r0 = memfd_create(&(0x7f0000000000)="7472757374656423766d6e65743140c0707070302476626f786e657431776c616e307b00", 0x5) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:25 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x200040, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x40080, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="747275737465642e73656375726974792e65766d00bd60885dd75124460961ffdcfac6a8e7f90c331b722e160fde46c05beca7c9b3942af0212808bfc223c27672d5a9de5c764070d1b1914277c34a6938b7ef44df83f86e9e55196287e7e736496775d7853790c3f7d03a8d813fb4ebd9a81c6cb4133d93e040b6c612ba7c291c3d877e1d84c152256a44f4145d1924ea08cc1edd2ebbdede9e027551480cdee8682078da41ae4df2c509d7335d1dd297736c0a38be23ef64754a"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$getregs(0xe, r1, 0x0, &(0x7f0000000480)=""/197) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000000c0)={0x1}) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 3: 16:32:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0xffffffffffffff94) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:26 executing program 3: 16:32:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 3: 16:32:26 executing program 3: 16:32:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=ANY=[], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x8000, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@dont_measure='dont_measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'security.evm\x00'}}]}}) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 3: 16:32:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000009fc8)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000013000)={0x20, 0x16, 0x401, 0x0, 0x0, {0x4000a}, [@nested={0xc, 0x0, [@typed={0x8, 0x6, @pid}]}]}, 0x20}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@subj_user={'subj_user', 0x3d, ']+'}}, {@uid_eq={'uid', 0x3d, r2}}]}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() fcntl$getownex(r1, 0x10, &(0x7f0000000000)) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:26 executing program 3: 16:32:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x1, 0xfffffffffffffff5, 0x5}, 0x10) 16:32:26 executing program 3: 16:32:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 16:32:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) 16:32:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='proc&\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000240)={0x3, 0x0, [0x0, 0x0, 0x0]}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='\\rsy.evm\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r2 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='proc&\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r2) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000606f228b6aeabf304ac793bc872f59e8bfa64b634e886b5139dc3398a9c3610416e696ca8ac65e4a832fcf584b1015d21a69f5b958"], 0xa6}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020a00000700000028bd70170080000005001a0000000000000000000000eaffac1414aa0000000040000000113c04a23743f008499547b5"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 16:32:27 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'ipddp0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote, @empty, @loopback, 0x8, 0x3d78, 0x10000, 0x500, 0x2, 0x44040000, r1}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000480)='./file0\x00', 0x102) ioctl$KDMKTONE(r2, 0x4b30, 0x8001) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0xa000, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r4, &(0x7f0000002000), 0x120f) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000540)={0x0, 0xfb, 0x36, 0x4, 0xffffffffffff23a8, "cb00f77afa8c8fce3f5fbc392c3e3dd0", "0744c2103e48e514943a738d8dc3268095c282e334761f08c646525d8cee93fcae"}, 0x36, 0x3) read$FUSE(r4, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r4, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x1, 0x5, 0x4521, 0x6, 0x20}) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x4040007fff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) keyctl$session_to_parent(0x12) 16:32:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'gre0\x00', 0x0}) rt_sigprocmask(0x0, &(0x7f0000000100)={0x8001}, &(0x7f0000000180), 0x8) recvfrom(r1, &(0x7f0000000480)=""/215, 0xd7, 0x40012040, &(0x7f0000000200)=@xdp={0x2c, 0x5, r2, 0x5}, 0x80) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000007, 0x80010, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) chroot(&(0x7f0000000000)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x103000) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000bb2000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) creat(&(0x7f0000000000)='./file0\x00', 0x80) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f27b73d6eb7903407"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x2020080, 0x0) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x80e85411, &(0x7f0000000280)={0x7, 0x2}) 16:32:27 executing program 3: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') r1 = memfd_create(&(0x7f0000000300)="6b657972696e6773796367726f757000000000000000000000008daf53b728d7d564e609d13c5384f341c1b4817c07aa9881313455cbb0d0e5070d446166dfa9aa814d9d403add47c530babe6c629823ce18a382f6b6a1b141a0cefd00ec560a1f7886f2f4e2c8558eafd69ccda7c02c947839ad51049e87fa6f1cf15f880f6dc91159e7fada17d26ba25620c940180e9a67a1e8337a1cd5c54f6e57106c8e3f4d128681a954896a45508053528b81b4b669", 0x0) sendfile(r1, r0, 0x0, 0x2000005) 16:32:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f288322b65e542a3eb49c14f3a61aab0d1931772cc6b10fd274601fea545a2f500bae790ed2f581c6cbdc21c8581"]) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000007000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4a, 0x4, 0xff, "69e5aa3bf725c4b50c2b34f25d4d563a", "bdea3f27f2e9cc509141830d7a708fe642c2d31c08550af4f248cf28caf964fb7554934a1b1ceca4eaf11253b9851455ddbe3005fb"}, 0x4a, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) 16:32:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003c00)={{{@in=@empty, @in6=@remote, 0x4e21, 0x5, 0x4e24, 0x8, 0x2, 0x273be9824c989a82, 0xa0, 0x7f, r1, r2}, {0x0, 0x4, 0x8, 0x6, 0x479d, 0x0, 0x3f, 0x7}, {0xfffffffffffffffe, 0x10000, 0x7b, 0x1f}, 0x1e, 0x6e6bb8, 0x2, 0x1, 0x1, 0x3}, {{@in6=@local, 0x4d3, 0x6c}, 0xa, @in=@broadcast, 0x3504, 0x3, 0x3, 0x81, 0x81, 0x7fff, 0x400}}, 0xe8) creat(0x0, 0x0) 16:32:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x15) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @remote}, &(0x7f0000000100)=0xc) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f00000000c0)={'system_u:object_r:hald_var_lib_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x7ff}, 0x57) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x1) setxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xc9, 0x1, 0x8, "2fe67b796ebd36d03dfa20c008ce6e31", "a7de64dbeb18c7a66846f48d546459ce0793b5145171f1775078f9b8f6130cbd8e8a7ad7a32ffe47faf297eab1f0f1cd49724992a6309063c517ad7011aabee07f1e60d8c16d0833123b13ebbb4e5a487264d3dbf5cf85bbda64aec0eea8bd6b9c358d8dc68e1fae0b22b98a0247a3f02ada686913118a9a9fa1179d9498fa9aea086be76c91fb722d94eb1d096b012001c46e9aced425326026639934ff11f1b84d1c5cce8055b244b12bb489c132a3a7a10b86"}, 0xc9, 0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400000, 0x0) faccessat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x10, 0x100) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000200)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x200000000000}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000280)={0xffffffffffffff53, 0x0, 0x2}, 0x3) 16:32:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000180), &(0x7f0000000200)) r2 = getegid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67626f75705f6964ae45b77c046341148addb4509b470c93c5b1c096ec25d64e60ccaa9d5fcaa81212738b1380c38a4f4e885b8f4f00ebd48b446586c66539d3dbec6a39741aaf6b3059b8e00afb88f93879913c508404a8c666ef0196add2e2", @ANYRESDEC=r2, @ANYBLOB=',default_permissions,max_read=0x00000000000052ef,allow_other,blksize=0x0000000000000400,allow_other,blksize=0x0000000000000800,obj_role=user_id,euid=', @ANYRESDEC=r3, @ANYBLOB=',defcontext=unconfined_u,smackfshat=,measure,obj_type=user_id,mask=^MAY_READ,\x00']) [ 674.957315] SELinux: Invalid class 2047 16:32:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c84726f7408e20c951e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030308088840473ef09bc6330136c657ee57330303046303030303030343030ca8d2c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84800) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0x20000008}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x105000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000180)=0x3) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'fuse\x00'}) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x80) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) init_module(&(0x7f00000000c0)='fd', 0x2, &(0x7f0000000100)='\x00') 16:32:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0x7}, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB="747275737465642e3f00000072b48328fc65766d00"], &(0x7f0000000f80)=""/210, 0xd2) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000007c0), &(0x7f0000000800)=0x10) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000001c0)=0x7ac0a730) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffff8371, 0x7, &(0x7f0000000680)=[{&(0x7f0000000480)="7bc4ecd1ff6b3a77935f6a70afe8ac0567fb58a58ed5768820c3fb05ba40f247f226a9f80d8d974b9ed37de99c0505df6055ba28d2a2e7e40c97747c4bbd54047e1ee766e3938bb66951f7c5cdbf65e60000d76f84801cd55bd66eb2652477e2830ab8c4b1f3c8f1d2e31e2053e1fd0830c2306162473e18504413d75074f511f62b2aa0381ae1a93e5a770a496eda495917ec5a0ba6a269bbd9a3", 0x9b, 0x2}, {&(0x7f0000003000)="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", 0x1000}, {&(0x7f0000000540)="832e2d894503f45e347b8c565f10db4f527753c5cda198d68fcfe44dd79fccd27b54c1446a097b1fb614dd5600ae31ee92e2a1153586af4491cbdb7db251a139deccd79fc3", 0x45, 0x5}, {&(0x7f0000000380)="d4f8728bb08e504a49dcd6692e8ec6fc6cfd4387f3d8bbd62fe80d", 0x1b, 0x5}, {&(0x7f00000005c0)="86fb4eb5976607aa85fdd9325b7db7472ceabbc0c358f48b6be436c67fac1a819db90ca931ad513993caf22f79468c9e53c3670934b4a5004dffcbed50603af8999a71c63026033a54f9be74494513485983985a60a00e3c43f0a00b81cb705e02f6c14c0a2b37afaf3588d46488f978f98e1c42aac58a597bdb2867a27bcd4f", 0x80, 0x9}, {&(0x7f0000000640)="47e88cc5297de57c1e2d82651e14874e4bc0fb8afb464e", 0x17}, {&(0x7f0000004000)="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", 0x1000, 0x4}], 0xa000, &(0x7f0000000740)={[{@noinit_itable='noinit_itable'}, {@acl='acl'}, {@auto_da_alloc='auto_da_alloc'}, {@nouid32='nouid32'}, {@grpjquota='grpjquota='}], [{@smackfsdef={'smackfsdef', 0x3d, 'fd'}}, {@measure='measure'}]}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000180)=0x8) 16:32:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x7}, 0x8) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) prctl$PR_GET_SECUREBITS(0x1b) munlockall() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000000)="708a748b04af74479483bbd08acafc8a3f6bc857b40d1693b87dd1b8", 0x1c) 16:32:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x0, 0x1, {0x30, 0x1e, 0xa, 0x1, 0x3, 0x4, 0x5, 0x11e}}) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0xffffffad, 0xfffffffffffffff5, 0x6}, 0x10) 16:32:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) mmap(&(0x7f0000c09000/0x1000)=nil, 0x1000, 0x8, 0xa010, r0, 0x0) munlockall() r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) 16:32:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='r'], 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 16:32:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000004000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) read$FUSE(r0, &(0x7f0000005000), 0x1000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x80) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) init_module(&(0x7f00000000c0)='fd', 0x2, &(0x7f0000000100)='\x00') 16:32:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=@random={'trusted.', 'security.evm\x00'}, &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r1, &(0x7f0000002000), 0x120f) read$FUSE(r1, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) 16:32:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000f40)=ANY=[@ANYBLOB='tity.evm\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000f80)=""/210, 0xd2) read$FUSE(r0, &(0x7f0000002000), 0x120f) r1 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0xc2) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340), &(0x7f0000000380)=0x4) read$FUSE(r0, &(0x7f0000005000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000003c0)={0x10, 0x0, 0x2}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101000, 0xa0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000200)={0x2e20, 0x101, 0x400, 0x2, 0x40, 0x2}) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x4, 0x40000, 0x2, 0x1, 0x0, 0x7}}, 0x50) [ 676.299587] BUG: unable to handle kernel paging request at ffffed005969a7ff [ 676.306992] IP: [] fuse_dev_do_write+0x1316/0x23d0 [ 676.313619] PGD 21fffb067 [ 676.316264] PUD 21fff9067 PMD 0 [ 676.319748] [ 676.321448] Oops: 0000 [#1] PREEMPT SMP KASAN [ 676.325965] Modules linked in: [ 676.329321] CPU: 1 PID: 26827 Comm: syz-executor3 Not tainted 4.9.143+ #75 [ 676.336310] task: ffff8801a20b17c0 task.stack: ffff8801ca580000 [ 676.342340] RIP: 0010:[] [] fuse_dev_do_write+0x1316/0x23d0 [ 676.351389] RSP: 0018:ffff8801ca587910 EFLAGS: 00010a07 [ 676.356814] RAX: dffffc0000000000 RBX: ffff8801ca911488 RCX: ffff8801cb4d4000 [ 676.364059] RDX: 1ffff1005969a7ff RSI: ffff8802cb4d3fff RDI: ffff8801ca911538 [ 676.371307] RBP: ffff8801ca587ba0 R08: 0000000000000000 R09: 0000000000000001 [ 676.378555] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 676.385799] R13: ffff8801ca587bd0 R14: ffff8801d99c2000 R15: 1ffff100394b0f2f [ 676.393048] FS: 00007f30d6039700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 676.401247] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 676.407136] CR2: ffffed005969a7ff CR3: 00000001d46e5000 CR4: 00000000001606b0 [ 676.414387] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 676.421635] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 676.428886] Stack: [ 676.431012] ffff880100000000 ffff8801ca587bd0 ffff8801ca911488 ffff8801ca911538 [ 676.439033] ffffffff00000001 ffff880100001000 ffff8801ca911524 ffff8801d99c2008 [ 676.447042] ffff8801ca911530 ffff8801ca9114b8 ffff8801d99c2010 ffff8801a4a76600 [ 676.455095] Call Trace: [ 676.457660] [] ? fuse_dev_release+0x480/0x480 [ 676.463785] [] ? get_futex_key_refs.isra.4+0xa0/0xa0 [ 676.470517] [] ? fuse_put_request+0x1d3/0x310 [ 676.476639] [] ? futex_wait_restart+0x230/0x230 [ 676.482943] [] ? avc_has_extended_perms+0x56a/0xd90 [ 676.489586] [] ? avc_has_extended_perms+0xde/0xd90 [ 676.496171] [] ? __lock_acquire+0x654/0x4a10 [ 676.502208] [] fuse_dev_write+0x142/0x1d0 [ 676.507988] [] ? fuse_dev_splice_write+0xc00/0xc00 [ 676.514544] [] ? iov_iter_init+0xaf/0x1d0 [ 676.520315] [] __vfs_write+0x3d7/0x580 [ 676.525848] [] ? __vfs_read+0x560/0x560 [ 676.531464] [] ? avc_policy_seqno+0x9/0x20 [ 676.537329] [] ? selinux_file_permission+0x82/0x470 [ 676.544019] [] ? rw_verify_area+0xe5/0x2a0 [ 676.549882] [] vfs_write+0x187/0x520 [ 676.555220] [] SyS_write+0xd9/0x1c0 [ 676.560470] [] ? SyS_read+0x1c0/0x1c0 [ 676.565913] [] ? do_syscall_64+0x48/0x550 [ 676.571866] [] ? SyS_read+0x1c0/0x1c0 [ 676.577294] [] do_syscall_64+0x19f/0x550 [ 676.583000] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 676.589897] Code: 02 84 c0 74 08 3c 03 0f 8e 33 10 00 00 8b 83 b0 00 00 00 83 e8 01 48 8d 34 01 48 b8 00 00 00 00 00 fc ff df 48 89 f2 48 c1 ea 03 <0f> b6 04 02 48 89 f2 83 e2 07 38 d0 7f 08 84 c0 0f 85 32 0d 00 [ 676.616953] RIP [] fuse_dev_do_write+0x1316/0x23d0 [ 676.623635] RSP [ 676.627248] CR2: ffffed005969a7ff [ 676.630706] ---[ end trace 16e3d36a6b37baa6 ]--- [ 676.635458] Kernel panic - not syncing: Fatal exception [ 676.641168] Kernel Offset: disabled [ 676.644777] Rebooting in 86400 seconds..