&(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x8000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0xffffffc8, @empty, 0x800}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:34 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x309c00, 0x10) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0xffffffffffffff31) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) 21:36:34 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1014000, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = open(&(0x7f0000002140)='./file0\x00', 0x204204, 0xf5) connect$unix(r2, &(0x7f0000002180)=@abs={0x0, 0x0, 0x4e22}, 0x6e) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xffffffffffffffea, 0x0, {{0x0, 0x202, 0x2, r1}}}, 0x28) 21:36:34 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 21:36:34 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x10) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000004180)={0x110, 0x0, r1, [{0x2, 0xf447, 0x5, 0x10000, '-)(-\n'}, {0x4, 0x10000, 0x2, 0x380, ',}'}, {0x6, 0x8000000000000000, 0x3, 0x3, '$$\\'}, {0x0, 0x401, 0x3, 0x1, '(]\xa3'}, {0x5, 0xdd1, 0x2, 0x9, '[\x9e'}, {0x4, 0x5, 0x3, 0xea9, ':)%'}, {0x6, 0xffff, 0x3, 0x8, ':,-'}, {0x4, 0x4, 0x2, 0x8001, '%/'}]}, 0x110) 21:36:34 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x309c00, 0x10) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0xffffffffffffff31) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) 21:36:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x8000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0xffffffc8, @empty, 0x800}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 21:36:34 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) mount$9p_virtio(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140), 0x80, &(0x7f0000002180)={'trans=virtio,', {[{@access_client}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@access_client}, {@fscache}, {@version_L}, {@version_L}], [{@smackfsroot={'smackfsroot', 0x3d, '+'}}, {@smackfsroot}, {@euid_eq={'euid', 0x3d, r1}}, {@seclabel}]}}) 21:36:34 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) [ 2981.629030] cgroup: cgroup2: unknown option "memory_re3¥Ùcursiveprot" 21:36:34 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000002140)=""/166, 0xa6) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 21:36:34 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:34 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x309c00, 0x10) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0xffffffffffffff31) (async) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0xffffffffffffff31) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) 21:36:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x8000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0xffffffc8, @empty, 0x800}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:34 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0xffffff9b, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x20, "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", 0x40, 0x80, 0xff, 0xff, 0x6, 0x6, 0x2}}}, 0x128) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) [ 2981.755443] 9pnet_virtio: no channels available for device syz 21:36:34 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0xffffff9b, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x20, "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", 0x40, 0x80, 0xff, 0xff, 0x6, 0x6, 0x2}}}, 0x128) 21:36:34 executing program 2: unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:34 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x1d) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x4}}}, 0x28) 21:36:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x8000, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0xffffffc8, @empty, 0x800}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:34 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/109, 0x6d}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f0000000200)=""/184, 0xb8}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f0000000340)=""/68, 0x44}], 0x6, &(0x7f0000000440)=""/151, 0x97}, 0x100) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 21:36:34 executing program 2: unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:34 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x1d) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x4}}}, 0x28) 21:36:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:34 executing program 2: unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 21:36:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:35 executing program 2: open(0x0, 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:35 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x1d) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x4}}}, 0x28) 21:36:35 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"2e3d9775b35eef3e096792fd2c86b89d"}, 0x6, 0x2be4, 0x9}, @in={0x2, 0x4e24, @loopback}}}, 0x118) 21:36:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 21:36:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:35 executing program 2: open(0x0, 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:35 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x0, {{0x6, 0x0, 0x2}}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 21:36:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 21:36:35 executing program 2: open(0x0, 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:35 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) 21:36:35 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x0, {{0x6, 0x0, 0x2}}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) (async) socket$inet6_udplite(0xa, 0x2, 0x88) 21:36:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:35 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"2e3d9775b35eef3e096792fd2c86b89d"}, 0x6, 0x2be4, 0x9}, @in={0x2, 0x4e24, @loopback}}}, 0x118) 21:36:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:35 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:35 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) 21:36:35 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"2e3d9775b35eef3e096792fd2c86b89d"}, 0x6, 0x2be4, 0x9}, @in={0x2, 0x4e24, @loopback}}}, 0x118) 21:36:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:35 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:35 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x0, {{0x6, 0x0, 0x2}}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) 21:36:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:35 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) 21:36:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), r1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) 21:36:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 21:36:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@hci, &(0x7f0000000040)=0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"2e3d9775b35eef3e096792fd2c86b89d"}, 0x6, 0x2be4, 0x9}, @in={0x2, 0x4e24, @loopback}}}, 0x118) 21:36:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 21:36:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f0000004180)={0x60, 0x0, r1, {{0x7, 0x400, 0x9, 0x6, 0x8000000000000000, 0x80000001, 0x34, 0xf3}}}, 0x60) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r2, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r3, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, r3}, 0x20) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 21:36:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, 0x0, 0x200) 21:36:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x149000, 0x195) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000002180)=ANY=[@ANYBLOB="000000000000000000000000d7a1a0c04af1dfaa25d416a55ac507fc5e4e880955cad0ffdf4dd6d1ff1fd8cd680bb4ccce8cffe5000000a1bf2ed1b6332df5c72be6", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000100000000002e2f66696c65302f66696c653000"]) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000002200), &(0x7f0000002240)='./file0\x00', 0x8, 0x3) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000002140)='./file0\x00', 0x1000) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:36 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) 21:36:36 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0/file0\x00'}) r17 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r18 = getuid() r19 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19]) r20 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r21 = getuid() r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}}}, 0x30) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:36:36 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) [ 2983.296335] kauditd_printk_skb: 17 callbacks suppressed [ 2983.296353] audit: type=1804 audit(1677792996.310:2473): pid=25184 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13269/file0" dev="sda1" ino=14266 res=1 21:36:36 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0xd5, 0xfa00, {0x0, 0x0, r1, 0x0, 0x0, @ib={0x1b, 0x1000, 0x9, {"3c9bc6a4dfb9f1b856729fc532b92326"}, 0x100, 0x4, 0x9}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000180)={0x0, 0x9, 0x1, 0x4, '\x00', '\x00', '\x00', 0x2, 0x5, 0x0, 0x6, "a428d734262f00e93dd93005257e8980"}) 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:36:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xfffffffc}}, 0x10) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r5 = accept4$unix(r3, &(0x7f0000000200), &(0x7f0000000180)=0x6e, 0x800) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r5, {0x29, 0x200}}, './file1\x00'}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r2, 0xd793}}, 0x10) 21:36:36 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() (async) r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) (async) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r10 = getuid() (async) r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r14 = getuid() (async) r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0/file0\x00'}) (async) r17 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r18 = getuid() (async) r19 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19]) (async) r20 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r21 = getuid() (async) r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2983.345533] audit: type=1804 audit(1677792996.360:2474): pid=25184 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13269/file0" dev="sda1" ino=14266 res=1 21:36:36 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) [ 2983.391729] audit: type=1804 audit(1677792996.360:2475): pid=25184 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13269/file0" dev="sda1" ino=14266 res=1 21:36:36 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x30) 21:36:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0/file0\x00'}) r17 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r18 = getuid() r19 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19]) r20 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r21 = getuid() r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2983.445556] audit: type=1804 audit(1677792996.360:2476): pid=25184 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13269/file0" dev="sda1" ino=14266 res=1 21:36:36 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0/file0\x00'}) r17 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r18 = getuid() r19 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19]) r20 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r21 = getuid() r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2983.493657] audit: type=1804 audit(1677792996.360:2477): pid=25184 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13269/file0" dev="sda1" ino=14266 res=1 21:36:36 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r2 = geteuid() r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140), 0x2100410, &(0x7f00000029c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, '\x02/'}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '['}}, {@subj_role={'subj_role', 0x3d, '*'}}, {@euid_lt={'euid<', r4}}, {@audit}]}}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000002380)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x420, 0x330, 0x0, 0xffffffff, 0xffffffff, 0x508, 0x508, 0x508, 0xffffffff, 0x4, &(0x7f0000002340), {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [0xff, 0xffffff00], [0x0, 0x101ffff00, 0xff], 'bond0\x00', 'veth1_to_batadv\x00', {}, {}, 0x11, 0x6, 0x5, 0x61}, 0x0, 0x300, 0x330, 0x0, {}, [@common=@ipv6header={{0x28}, {0x90, 0x80}}, @common=@unspec=@bpf0={{0x230}, {0x1d, [{0x400, 0x9, 0x8, 0x1}, {0x0, 0x9b, 0x3, 0x6}, {0x400, 0x7, 0x9, 0x9}, {0x1, 0x2, 0xfc, 0x2}, {0x4, 0x1f, 0x35, 0x4}, {0xfffc, 0x7f, 0x0, 0x7fffffff}, {0x7, 0x9, 0xff, 0x1}, {0x401, 0x9, 0x3, 0x9}, {0x8000, 0x9, 0x2, 0x100}, {0xe45d, 0xff, 0x3, 0x5}, {0x1800, 0xff, 0x6, 0x7fffffff}, {0x1, 0x6, 0x1, 0x1}, {0x1ff, 0x3, 0x83, 0x10000000}, {0xdf4, 0x3f, 0x7b, 0x7}, {0xfffa, 0xfd, 0x8, 0x7ff}, {0x6, 0x6, 0x9, 0x6}, {0x5, 0x55, 0x80, 0x81}, {0x14, 0x1, 0x2, 0x3ff}, {0x1, 0x1, 0x3, 0x61057bcd}, {0x4, 0xc, 0x23, 0x4}, {0x4, 0xff, 0x80, 0x5}, {0x6, 0xf8, 0x2e, 0x80000000}, {0x400, 0x9, 0x5d}, {0xb, 0x20, 0x7, 0x8}, {0x9, 0x7, 0x0, 0xffffffff}, {0x7, 0x9b, 0x9, 0x6}, {0x2, 0x9, 0x4, 0x3}, {0x80, 0x4, 0xc8, 0x80000001}, {0x226f, 0x79, 0x9, 0xfffffff7}, {0x1, 0x0, 0x0, 0x7fffffff}, {0x0, 0x1, 0x7f, 0x4}, {0x6, 0x4, 0x2}, {0x8, 0x0, 0xff, 0x1}, {0x0, 0x0, 0x1, 0x3}, {0x1, 0x5, 0x7, 0x5}, {0xe380, 0x3f, 0x9, 0x3}, {0xc5, 0xf3, 0x1, 0x1}, {0x2, 0x4, 0xdb, 0x7}, {0x2f9, 0x1, 0x0, 0x2000000}, {0x5, 0x0, 0xff, 0x6}, {0x2, 0x81, 0xff, 0x6}, {0x5, 0x1f, 0x4, 0xfffffff8}, {0x1ff, 0x9, 0x8, 0x6}, {0x8, 0x6, 0x92, 0x10000}, {0x9c8a, 0x81, 0x7, 0x6}, {0x7, 0x7, 0xd3, 0x10000}, {0x8, 0x20, 0x9, 0x8}, {0x7, 0x5, 0x2, 0x100}, {0x2, 0x1, 0x40, 0xaf7}, {0x93, 0xc1, 0x6, 0x5}, {0x6, 0x1, 0x40, 0xfff}, {0x954a, 0x3, 0x6f, 0x2}, {0x5, 0x0, 0xf8, 0x7}, {0x40, 0x4, 0x2, 0x9b62}, {0x8, 0x3, 0x1, 0x7}, {0x1}, {0x8000, 0x1, 0x1f, 0xe03e}, {0x400, 0x1f, 0x3, 0x3}, {0x157, 0x3f, 0x8, 0x7f}, {0x4, 0x0, 0x47, 0x1}, {0x7ff, 0x40, 0x7f, 0x4}, {0x9, 0x1, 0x7f, 0x5}, {0x9, 0xb8, 0x1, 0x4}, {0xfff, 0x3a, 0x1, 0x1}], {0x6}}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x0, 0x3}, {0x4, 0x2, 0xc}, 0x401}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00', {0x40000000}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xffffff00, 0xffffff00, 0xffffff00, 0xffffffff], [0xff, 0xffffff00, 0xff, 0xffffff00], 'ip6gretap0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x1, 0x1, 0x42}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7fffffff, 0x4, 0x7ff, 0x10000, 0x6, 0xfffff14f, 0x7, 0x200]}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) 21:36:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) (async) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file0\x00'}) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0/file0\x00'}) r17 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r18 = getuid() getgid() (async) r19 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r18, @ANYBLOB=',group_id=', @ANYRESDEC=r19]) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r20 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) getuid() (async) r21 = getuid() getgid() (async) r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r20, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002200)={0x598, 0x0, r4, [{{0x3, 0x1, 0x9, 0x0, 0xba1, 0x3ff, {0x6, 0x1, 0x3, 0xfffffffffffffffd, 0x3178, 0x1, 0x6, 0x9, 0x224, 0x8000, 0x0, r1, r7, 0x10000, 0x939}}, {0x1, 0x8, 0x0, 0x4}}, {{0x3, 0x2, 0x9, 0x8d2, 0x4, 0x1, {0x1, 0x0, 0xfff, 0xffffffffffffffff, 0x1, 0x20, 0x2, 0x7, 0x2, 0x6000, 0x6fd, r8, r11, 0x6, 0x400}}, {0x5, 0x401, 0x2, 0x3, '!*'}}, {{0x6, 0x0, 0x8, 0x5, 0x8, 0x72, {0x1, 0x3, 0x4, 0x2, 0x3000, 0x2, 0x7fff, 0x8, 0x6, 0x6000, 0x80000000, r12, r2, 0x7, 0x1f}}, {0x3, 0x5, 0x3, 0x38000000, '\x95{['}}, {{0x0, 0x5cf, 0xcf3, 0x100000001, 0x5, 0x8, {0x2, 0x12, 0x7, 0x800, 0x9, 0x3ff, 0xfff, 0xced, 0xffff0001, 0x2000, 0x5, 0xee00, r2, 0xa65, 0x40}}, {0x2, 0x3, 0x0, 0x4}}, {{0x6, 0x0, 0x4d7, 0x80000000, 0x1000, 0x2f, {0x5, 0x9, 0x101, 0x8, 0x8bc, 0xfffffffffffff001, 0x8, 0x8, 0x4546, 0xc000, 0x5, r14, r2, 0x5, 0xed8}}, {0x3, 0x2, 0x2, 0x1, ')^'}}, {{0x4, 0x1, 0x6, 0x3, 0x1, 0x9, {0x2, 0x2, 0x5, 0x9, 0x1f, 0x502a2237, 0x400, 0x3c, 0x8001, 0xa000, 0xfffffffc, r1, r2, 0x0, 0x5}}, {0x1, 0x7fffffff, 0x0, 0x4}}, {{0x2, 0x2, 0xcbbc, 0xff, 0x5, 0x6, {0x0, 0x7, 0x58e, 0x80000000, 0xff, 0x1ff, 0x1, 0x80000001, 0x1, 0x1000, 0x9, r1, r16, 0x7, 0x7}}, {0x2, 0xffffffffffffffff, 0x5, 0x70, '[(*&{'}}, {{0x2, 0x3, 0x6, 0x0, 0xf5, 0x16, {0x1, 0x8, 0x3, 0x8000000000000000, 0xd6, 0x2, 0x2, 0x3ff, 0x400, 0xc000, 0x7ff, r18, r22, 0x3, 0x8}}, {0x3, 0x0, 0x6, 0x80, '](^{[{'}}, {{0x2, 0x2, 0x4, 0x40, 0x4, 0x852b, {0x2, 0x8, 0xffffffffffffffff, 0x7f, 0x200, 0x7, 0x1de8d51e, 0x9, 0x6, 0xa000, 0x7fffffff, r1, r2, 0x1000, 0xfff}}, {0x1, 0x3f, 0x3, 0x401, '\xcd-,'}}]}, 0x598) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) [ 2983.533821] audit: type=1804 audit(1677792996.490:2478): pid=25204 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13270/file0" dev="sda1" ino=13882 res=1 [ 2983.602460] audit: type=1804 audit(1677792996.510:2479): pid=25212 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13270/file0" dev="sda1" ino=13882 res=1 21:36:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r2 = geteuid() r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140), 0x2100410, &(0x7f00000029c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, '\x02/'}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '['}}, {@subj_role={'subj_role', 0x3d, '*'}}, {@euid_lt={'euid<', r4}}, {@audit}]}}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000002380)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x420, 0x330, 0x0, 0xffffffff, 0xffffffff, 0x508, 0x508, 0x508, 0xffffffff, 0x4, &(0x7f0000002340), {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [0xff, 0xffffff00], [0x0, 0x101ffff00, 0xff], 'bond0\x00', 'veth1_to_batadv\x00', {}, {}, 0x11, 0x6, 0x5, 0x61}, 0x0, 0x300, 0x330, 0x0, {}, [@common=@ipv6header={{0x28}, {0x90, 0x80}}, @common=@unspec=@bpf0={{0x230}, {0x1d, [{0x400, 0x9, 0x8, 0x1}, {0x0, 0x9b, 0x3, 0x6}, {0x400, 0x7, 0x9, 0x9}, {0x1, 0x2, 0xfc, 0x2}, {0x4, 0x1f, 0x35, 0x4}, {0xfffc, 0x7f, 0x0, 0x7fffffff}, {0x7, 0x9, 0xff, 0x1}, {0x401, 0x9, 0x3, 0x9}, {0x8000, 0x9, 0x2, 0x100}, {0xe45d, 0xff, 0x3, 0x5}, {0x1800, 0xff, 0x6, 0x7fffffff}, {0x1, 0x6, 0x1, 0x1}, {0x1ff, 0x3, 0x83, 0x10000000}, {0xdf4, 0x3f, 0x7b, 0x7}, {0xfffa, 0xfd, 0x8, 0x7ff}, {0x6, 0x6, 0x9, 0x6}, {0x5, 0x55, 0x80, 0x81}, {0x14, 0x1, 0x2, 0x3ff}, {0x1, 0x1, 0x3, 0x61057bcd}, {0x4, 0xc, 0x23, 0x4}, {0x4, 0xff, 0x80, 0x5}, {0x6, 0xf8, 0x2e, 0x80000000}, {0x400, 0x9, 0x5d}, {0xb, 0x20, 0x7, 0x8}, {0x9, 0x7, 0x0, 0xffffffff}, {0x7, 0x9b, 0x9, 0x6}, {0x2, 0x9, 0x4, 0x3}, {0x80, 0x4, 0xc8, 0x80000001}, {0x226f, 0x79, 0x9, 0xfffffff7}, {0x1, 0x0, 0x0, 0x7fffffff}, {0x0, 0x1, 0x7f, 0x4}, {0x6, 0x4, 0x2}, {0x8, 0x0, 0xff, 0x1}, {0x0, 0x0, 0x1, 0x3}, {0x1, 0x5, 0x7, 0x5}, {0xe380, 0x3f, 0x9, 0x3}, {0xc5, 0xf3, 0x1, 0x1}, {0x2, 0x4, 0xdb, 0x7}, {0x2f9, 0x1, 0x0, 0x2000000}, {0x5, 0x0, 0xff, 0x6}, {0x2, 0x81, 0xff, 0x6}, {0x5, 0x1f, 0x4, 0xfffffff8}, {0x1ff, 0x9, 0x8, 0x6}, {0x8, 0x6, 0x92, 0x10000}, {0x9c8a, 0x81, 0x7, 0x6}, {0x7, 0x7, 0xd3, 0x10000}, {0x8, 0x20, 0x9, 0x8}, {0x7, 0x5, 0x2, 0x100}, {0x2, 0x1, 0x40, 0xaf7}, {0x93, 0xc1, 0x6, 0x5}, {0x6, 0x1, 0x40, 0xfff}, {0x954a, 0x3, 0x6f, 0x2}, {0x5, 0x0, 0xf8, 0x7}, {0x40, 0x4, 0x2, 0x9b62}, {0x8, 0x3, 0x1, 0x7}, {0x1}, {0x8000, 0x1, 0x1f, 0xe03e}, {0x400, 0x1f, 0x3, 0x3}, {0x157, 0x3f, 0x8, 0x7f}, {0x4, 0x0, 0x47, 0x1}, {0x7ff, 0x40, 0x7f, 0x4}, {0x9, 0x1, 0x7f, 0x5}, {0x9, 0xb8, 0x1, 0x4}, {0xfff, 0x3a, 0x1, 0x1}], {0x6}}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x0, 0x3}, {0x4, 0x2, 0xc}, 0x401}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00', {0x40000000}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xffffff00, 0xffffff00, 0xffffff00, 0xffffffff], [0xff, 0xffffff00, 0xff, 0xffffff00], 'ip6gretap0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x1, 0x1, 0x42}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7fffffff, 0x4, 0x7ff, 0x10000, 0x6, 0xfffff14f, 0x7, 0x200]}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) 21:36:36 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="1e6f000001000000180000ee81500da365885700", @ANYRES32=r0, @ANYBLOB="aa0000000b0000002eac48f61e36660e"]) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000002140)=""/198, 0xc6) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000002240)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x1, r2, 0x30, 0x1, @in6={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000}}}, 0xa0) read$FUSE(r0, &(0x7f0000004380)={0x2020}, 0xfffffffffffffffa) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000001c0)) ioctl$RTC_UIE_ON(r3, 0x7003) 21:36:36 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) [ 2983.640360] audit: type=1804 audit(1677792996.520:2480): pid=25210 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13270/file0" dev="sda1" ino=13882 res=1 21:36:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}, 0x100) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000002140), &(0x7f0000002180)='./file0\x00', 0x8, 0x3) [ 2983.689729] audit: type=1804 audit(1677792996.520:2481): pid=25208 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13270/file0" dev="sda1" ino=13882 res=1 [ 2983.723245] audit: type=1804 audit(1677792996.520:2482): pid=25208 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13270/file0" dev="sda1" ino=13882 res=1 21:36:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) r2 = socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r3}}, 0xffe5) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000001880)={0x15, 0x110, 0xfa00, {r3, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x7}, @ib={0x1b, 0x3, 0x5, {"e0dcc06f8a9e249fd03c3ee0cb059a9d"}, 0x5, 0xffffffffffffff81, 0x9}}}, 0x118) recvmsg$can_bcm(r2, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000001300)=""/249, 0xf9}, {&(0x7f0000001400)=""/197, 0xc5}, {&(0x7f0000000000)=""/71, 0x47}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000001500)=""/187, 0xbb}, {&(0x7f0000000240)}, {&(0x7f00000015c0)=""/167, 0xa7}, {&(0x7f0000001680)=""/48, 0x30}], 0xa, &(0x7f0000001780)=""/168, 0xa8}, 0x12101) 21:36:36 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)=@v1={0x1000000, [{0xa41, 0x40}]}, 0xc, 0x2) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_INTERRUPT(r0, &(0x7f0000002180)={0x10, 0xffffffffffffffda, r2}, 0x10) 21:36:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:37 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x600182, 0x40) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000002140)=ANY=[@ANYBLOB="010000000100000018001000c8417de1506e915171541da6ba2d20379e0ed574d336a337814558d6391d9a4e2aa939e51a98708a828c551ca19c6e637a9e0e26960300000000000000e02ed31eb05e26ff69654c51613a99e2419b1db61fe192f5b904c13a7213abd9b18e72a068186ded3fa8f80e3fe4", @ANYRES32=r1, @ANYBLOB="00000100010000002e2f66696c3000"]) 21:36:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:37 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r0, &(0x7f0000002140)={0x28, 0xffffffffffffffda, r2, {{0x0, 0x10001}}}, 0x28) 21:36:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f0000000140)={0x0, 0x304, 0x0, {}, {}, {0x1}, 0x1, @canfd={{0x1, 0x0, 0x0, 0x1}, 0x22, 0x0, 0x0, 0x0, "fe7df702b109780a3febf205f8334a5e373309f86cf1d169a0741c5a0f5f8a8cfa7176d44fb2ff6935893739413188ed84756998bafb81fc58e8109dee98be5f"}}, 0x80}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000001c0)={0x30, 0x38, 0x1, 0x7, 0xa, 0x46, 0x2, 0xec, 0xffffffffffffffff}) 21:36:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:37 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x600182, 0x40) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000002140)=ANY=[@ANYBLOB="010000000100000018001000c8417de1506e915171541da6ba2d20379e0ed574d336a337814558d6391d9a4e2aa939e51a98708a828c551ca19c6e637a9e0e26960300000000000000e02ed31eb05e26ff69654c51613a99e2419b1db61fe192f5b904c13a7213abd9b18e72a068186ded3fa8f80e3fe4", @ANYRES32=r1, @ANYBLOB="00000100010000002e2f66696c3000"]) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000002140)=ANY=[@ANYBLOB="010000000100000018001000c8417de1506e915171541da6ba2d20379e0ed574d336a337814558d6391d9a4e2aa939e51a98708a828c551ca19c6e637a9e0e26960300000000000000e02ed31eb05e26ff69654c51613a99e2419b1db61fe192f5b904c13a7213abd9b18e72a068186ded3fa8f80e3fe4", @ANYRES32=r1, @ANYBLOB="00000100010000002e2f66696c3000"]) 21:36:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000002500)={{'\x00', 0x2}, {0x5}, 0x4, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)="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", 0x15d, 0x0, &(0x7f00000022c0)={0x2, 0x1a0, {0x0, 0xc, 0xc3, "2379c4833960d8287388eced8dad9d67712721cd767cdee105e03f18ab050452bd365d212e58eb1ee3a36b6253930e6435a3fe3710f2ef3ae28bc2b16b1e841314b2ca3ae247cd577bba5143656112399d822eea8d4961e157af7cd1b4ac97b1d4bc5733b7795c8ad4aefcd7e2548c6052b22b36b5266b8af0dafb252e3dff43e2a2fa127358d86b1708cf8c18efe10466d44bbd975cdf9b664414d2888096cce0675af9631b0626b0db5930127890fc5f8ce3112a0649e72badf88625529e3a2f49f4", 0xd0, "91184a300ea683343ee67a60b19c2a8f6b9929b8b75647039cb77571204c6d002baa83b90720469ef82ce06fc989b667fc1b7f72dec777ad9996dc45c1b56c3782cdd8e992bdd8fc4c5964055ef2dfa2ddce0b6f01bf509d2acc0dd80225b366a8dfa63855ed4b76fbfbf150864159046f289f9cbf938aa4cf827f6f14b56b37521dcf18c8ccfcf0d2d1e0c2ab1044de4490d7f18280ddd6718352af5cea9988a6361b237ed1e5d201abb49e1d70d10bfd9cfb05fd6271320878204bd22f5979450d58008b37758179b73bed6a34805a"}, 0x64, "2375eb378abdc59c0f8091aa8e27b3164176a630d3ccd3d310ba429c8ad30f05872aa6e206bd4d5240499f8a13cd03161457928323553e0a3e5bfbd3b3a08ac918459b54a96191ad8a3644515907e22fe24b6e65e7942defdbdfb1465564394b18f6847c"}, 0x210}) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) r2 = socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r3}}, 0xffe5) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000001880)={0x15, 0x110, 0xfa00, {r3, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x7}, @ib={0x1b, 0x3, 0x5, {"e0dcc06f8a9e249fd03c3ee0cb059a9d"}, 0x5, 0xffffffffffffff81, 0x9}}}, 0x118) recvmsg$can_bcm(r2, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000001300)=""/249, 0xf9}, {&(0x7f0000001400)=""/197, 0xc5}, {&(0x7f0000000000)=""/71, 0x47}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000001500)=""/187, 0xbb}, {&(0x7f0000000240)}, {&(0x7f00000015c0)=""/167, 0xa7}, {&(0x7f0000001680)=""/48, 0x30}], 0xa, &(0x7f0000001780)=""/168, 0xa8}, 0x12101) 21:36:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000002500)={{'\x00', 0x2}, {0x5}, 0x4, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140)="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", 0x15d, 0x0, &(0x7f00000022c0)={0x2, 0x1a0, {0x0, 0xc, 0xc3, "2379c4833960d8287388eced8dad9d67712721cd767cdee105e03f18ab050452bd365d212e58eb1ee3a36b6253930e6435a3fe3710f2ef3ae28bc2b16b1e841314b2ca3ae247cd577bba5143656112399d822eea8d4961e157af7cd1b4ac97b1d4bc5733b7795c8ad4aefcd7e2548c6052b22b36b5266b8af0dafb252e3dff43e2a2fa127358d86b1708cf8c18efe10466d44bbd975cdf9b664414d2888096cce0675af9631b0626b0db5930127890fc5f8ce3112a0649e72badf88625529e3a2f49f4", 0xd0, "91184a300ea683343ee67a60b19c2a8f6b9929b8b75647039cb77571204c6d002baa83b90720469ef82ce06fc989b667fc1b7f72dec777ad9996dc45c1b56c3782cdd8e992bdd8fc4c5964055ef2dfa2ddce0b6f01bf509d2acc0dd80225b366a8dfa63855ed4b76fbfbf150864159046f289f9cbf938aa4cf827f6f14b56b37521dcf18c8ccfcf0d2d1e0c2ab1044de4490d7f18280ddd6718352af5cea9988a6361b237ed1e5d201abb49e1d70d10bfd9cfb05fd6271320878204bd22f5979450d58008b37758179b73bed6a34805a"}, 0x64, "2375eb378abdc59c0f8091aa8e27b3164176a630d3ccd3d310ba429c8ad30f05872aa6e206bd4d5240499f8a13cd03161457928323553e0a3e5bfbd3b3a08ac918459b54a96191ad8a3644515907e22fe24b6e65e7942defdbdfb1465564394b18f6847c"}, 0x210}) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:37 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x2, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x8aaecafc9cf6c4dd, r2, {{0x3, 0x4, 0x1}}}, 0x28) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x101, 0x62a, {"cea8116c940dfcf469c712bef99d2191"}, 0x7, 0xffff, 0x93fe}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000002140)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x82a9, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x9, @local, 0x9}, @ib={0x1b, 0x8001, 0x75ae, {"cdb65c8ae4e228b56cd67353f936a847"}, 0x1, 0x2, 0x200}}}, 0x118) 21:36:37 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x600182, 0x40) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000002140)=ANY=[@ANYBLOB="010000000100000018001000c8417de1506e915171541da6ba2d20379e0ed574d336a337814558d6391d9a4e2aa939e51a98708a828c551ca19c6e637a9e0e26960300000000000000e02ed31eb05e26ff69654c51613a99e2419b1db61fe192f5b904c13a7213abd9b18e72a068186ded3fa8f80e3fe4", @ANYRES32=r1, @ANYBLOB="00000100010000002e2f66696c3000"]) 21:36:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:37 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:37 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r3, &(0x7f0000004140)={0x2020}, 0x1567) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:37 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) write$FUSE_ENTRY(r0, &(0x7f0000002140)={0x90, 0xb, r1, {0x4, 0x2, 0x3, 0x101, 0x8c, 0x8, {0x4, 0x8, 0x200, 0x8c, 0xffffffff, 0x2, 0x431, 0x9, 0x7ff, 0x4000, 0x10000, r2, r5, 0x8, 0x3}}}, 0x90) 21:36:37 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000380)={0x9, 0x8, 0x6, 0x2, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}]}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r3, &(0x7f0000004140)={0x2020}, 0x1567) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) r2 = socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r3}}, 0xffe5) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000001880)={0x15, 0x110, 0xfa00, {r3, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x7}, @ib={0x1b, 0x3, 0x5, {"e0dcc06f8a9e249fd03c3ee0cb059a9d"}, 0x5, 0xffffffffffffff81, 0x9}}}, 0x118) recvmsg$can_bcm(r2, &(0x7f0000001840)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f0000001300)=""/249, 0xf9}, {&(0x7f0000001400)=""/197, 0xc5}, {&(0x7f0000000000)=""/71, 0x47}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000001500)=""/187, 0xbb}, {&(0x7f0000000240)}, {&(0x7f00000015c0)=""/167, 0xa7}, {&(0x7f0000001680)=""/48, 0x30}], 0xa, &(0x7f0000001780)=""/168, 0xa8}, 0x12101) 21:36:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) write$FUSE_ENTRY(r0, &(0x7f0000002140)={0x90, 0xb, r1, {0x4, 0x2, 0x3, 0x101, 0x8c, 0x8, {0x4, 0x8, 0x200, 0x8c, 0xffffffff, 0x2, 0x431, 0x9, 0x7ff, 0x4000, 0x10000, r2, r5, 0x8, 0x3}}}, 0x90) 21:36:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000004340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x9) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r4}}, './file0\x00'}) write$FUSE_LK(r6, &(0x7f00000043c0)={0x28, 0xffffffffffffffda, r2, {{0x3, 0xff, 0x2, r5}}}, 0x28) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() ioctl$RTC_UIE_ON(r9, 0x7003) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004300)=@known='trusted.overlay.origin\x00') r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) write$FUSE_DIRENTPLUS(r7, &(0x7f0000004180)={0x150, 0x0, r8, [{{0x4, 0x1, 0x3, 0x6, 0x3, 0x81, {0x1, 0xf03d, 0x1, 0x80, 0x5, 0x1000, 0x4, 0x8, 0x5, 0x6000, 0x80000001, r3, r4, 0xa3ca, 0x6}}, {0x0, 0x1, 0x2, 0x2, '#,'}}, {{0x5, 0x1, 0x3, 0x1, 0x20, 0x530, {0x0, 0x9, 0x3, 0xb3, 0x8000, 0xc37, 0x2, 0x8, 0xab9, 0x2000, 0xfffff800, 0x0, r11, 0x4, 0x20}}, {0x3, 0x2000000, 0x1, 0x4, '\\'}}]}, 0x150) 21:36:38 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r4 = getuid() (async) r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) (async) write$FUSE_ENTRY(r0, &(0x7f0000002140)={0x90, 0xb, r1, {0x4, 0x2, 0x3, 0x101, 0x8c, 0x8, {0x4, 0x8, 0x200, 0x8c, 0xffffffff, 0x2, 0x431, 0x9, 0x7ff, 0x4000, 0x10000, r2, r5, 0x8, 0x3}}}, 0x90) 21:36:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:38 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000380)={{'\x00', 0x1}, {0x10001}, 0x1f7, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="a98700d63ecf7b5275a349b64ee650a5d1388381987f14d2132eeaacda36ce5fe49efbdc8fe653bbbb92ed5e4916a9bfc224f28b7e7e39ed3d1e736d719e0a3f72897551a3185e89cf22ed65fcd3d15d27fa50393af8999869cd43e68acfb23c212f82ab1ae4f22ea9e1b18c701a30ebafb467d60e00e945145bb5c31c3aa9cd36e3bf6fbc148578aa", 0x89, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x17a}) 21:36:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r2}}, 0xffe5) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000001880)={0x15, 0x110, 0xfa00, {r2, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x7}, @ib={0x1b, 0x3, 0x5, {"e0dcc06f8a9e249fd03c3ee0cb059a9d"}, 0x5, 0xffffffffffffff81, 0x9}}}, 0x118) 21:36:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:39 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:39 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000380)={{'\x00', 0x1}, {0x10001}, 0x1f7, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="a98700d63ecf7b5275a349b64ee650a5d1388381987f14d2132eeaacda36ce5fe49efbdc8fe653bbbb92ed5e4916a9bfc224f28b7e7e39ed3d1e736d719e0a3f72897551a3185e89cf22ed65fcd3d15d27fa50393af8999869cd43e68acfb23c212f82ab1ae4f22ea9e1b18c701a30ebafb467d60e00e945145bb5c31c3aa9cd36e3bf6fbc148578aa", 0x89, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x17a}) 21:36:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r2}}, 0xffe5) 21:36:39 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffc, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20}, r2}}, 0xffe5) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000001880)={0x15, 0x110, 0xfa00, {r2, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x7}, @ib={0x1b, 0x3, 0x5, {"e0dcc06f8a9e249fd03c3ee0cb059a9d"}, 0x5, 0xffffffffffffff81, 0x9}}}, 0x118) 21:36:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) 21:36:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:39 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) accept4(r1, &(0x7f0000002140)=@ethernet={0x0, @remote}, &(0x7f00000021c0)=0x80, 0x80800) 21:36:39 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) socket$can_bcm(0x1d, 0x2, 0x2) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) accept4(r1, &(0x7f0000002140)=@ethernet={0x0, @remote}, &(0x7f00000021c0)=0x80, 0x80800) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) accept4(r1, &(0x7f0000002140)=@ethernet={0x0, @remote}, &(0x7f00000021c0)=0x80, 0x80800) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r0}}, 0x30) 21:36:40 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffff9, 0x8, "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", 0x4, 0x1f, 0x2, 0x6, 0x3, 0x48, 0x64}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0), 0x0, {0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff8}, r2}}, 0x38) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) accept4(r1, &(0x7f0000002140)=@ethernet={0x0, @remote}, &(0x7f00000021c0)=0x80, 0x80800) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r0}}, 0x30) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffff9, 0x8, "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", 0x4, 0x1f, 0x2, 0x6, 0x3, 0x48, 0x64}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0), 0x0, {0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff8}, r2}}, 0x38) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r0}}, 0x30) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) accept4(r1, &(0x7f0000002140)=@ethernet={0x0, @remote}, &(0x7f00000021c0)=0x80, 0x80800) 21:36:40 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffff9, 0x8, "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", 0x4, 0x1f, 0x2, 0x6, 0x3, 0x48, 0x64}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0), 0x0, {0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff8}, r2}}, 0x38) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r0}}, 0x128) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:40 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r0}}, 0x128) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:40 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffff9, 0x8, "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", 0x4, 0x1f, 0x2, 0x6, 0x3, 0x48, 0x64}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0), 0x0, {0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffff8}, r2}}, 0x38) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:40 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r0}}, 0x128) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:40 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0/file0\x00'}) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) mount$tmpfs(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x1010000, &(0x7f0000000200)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x6b, 0x37, 0x30, 0x25, 0x6b]}}, {@mode={'mode', 0x3d, 0x22}}, {@huge_never}, {@gid={'gid', 0x3d, r1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@obj_user={'obj_user', 0x3d, '$),{.'}}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@uid_gt={'uid>', r2}}, {@permit_directio}, {@hash}]}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x8}}, 0x20) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:40 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:40 executing program 3: mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x2010000, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=00000000000000000000037,mode=00000000000000000000010,mode=00000000000000000000001,mode=09000000000000000000000,mode=00000000000000000000777,mode=00000000000000000000000,mode=00000000000000000177777,mode=00000000000000000000006,fscontext=staff_u,\x00']) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, r1, {0x673, 0x4, 0x80000001, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0), 0xccc08eb8a6e4a3ad, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) 21:36:40 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 21:36:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x1}}}, 0x28) 21:36:41 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockname$unix(r0, &(0x7f0000002140)=@abs, &(0x7f0000000040)=0x6e) r3 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r4 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r4, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004500)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0\x00'}) r9 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r10 = getuid() r11 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11]) syz_fuse_handle_req(r0, &(0x7f00000021c0)="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", 0x2000, &(0x7f0000004780)={&(0x7f00000041c0)={0x50, 0x0, 0x2, {0x7, 0x26, 0xe9d3, 0x3100, 0xfffd, 0x1ff, 0xfffff000, 0x800}}, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0xfffffffffffffff8}}, &(0x7f0000004240)={0x18, 0xfffffffffffffff5, 0x9, {0xfff}}, &(0x7f0000004280)={0x18, 0x0, 0x3}, &(0x7f00000042c0)={0x18, 0x0, 0x3, {0x80}}, &(0x7f0000004300)={0x28, 0xfffffffffffffff5, 0x6, {{0x5, 0x7d, 0x0, r4}}}, &(0x7f0000004340)={0x60, 0x0, 0x4, {{0x80000001, 0x5, 0x7, 0x1, 0xffffffff, 0x8001, 0x1, 0x2}}}, &(0x7f00000043c0)={0x18, 0x0, 0x30, {0xff}}, &(0x7f0000004400)={0x1a, 0x0, 0x501, {'{-h\xf8@+:\\\'\x00'}}, &(0x7f0000004440)={0x20, 0x105b404878734af7, 0x8000, {0x0, 0x38}}, &(0x7f0000004480)={0x78, 0x0, 0x0, {0xa4, 0x0, 0x0, {0x6, 0xffffffffffffffff, 0x442, 0x3, 0x6, 0x6, 0x20, 0x3f, 0x7, 0xa000, 0x3, r1, r2, 0xaa0, 0x93a}}}, &(0x7f0000004540)={0x90, 0x0, 0x2, {0x6, 0x2, 0x2, 0x0, 0x7fffffff, 0x8, {0x4, 0xff, 0x20, 0x100000000, 0x8c2, 0x6, 0xfffffffb, 0x9, 0x8, 0x1000, 0x20, r6, r8, 0xfff, 0x8}}}, &(0x7f0000004600)={0x38, 0x0, 0x7, [{0x6, 0x57, 0xb, 0x8, '(+\xba-:&.$+))'}]}, &(0x7f0000004640)={0x10, 0x0, 0x7}, &(0x7f0000004680)={0xa0, 0xffffffffffffffda, 0x6, {{0x0, 0x0, 0x0, 0x80000000, 0x0, 0x3f, {0x5, 0x1, 0x7, 0x4, 0x9, 0x8, 0x1, 0x9, 0xa300, 0xa000, 0x0, r10, r2, 0x2, 0x9}}, {0x0, 0x1a}}}, &(0x7f0000004740)={0x20, 0x0, 0x1, {0x6, 0x4, 0x3, 0x9}}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:41 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=""/255, 0xff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 1: r0 = geteuid() r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) r6 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r7 = getuid() r8 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8]) mount$9p_virtio(&(0x7f00000023c0), &(0x7f0000002400)='./file1\x00', &(0x7f0000002440), 0x3089c0e, &(0x7f0000002480)={'trans=virtio,', {[{@cache_mmap}, {@uname={'uname', 0x3d, 'audit'}}, {@cache_mmap}, {@afid}, {@access_client}, {@access_uid={'access', 0x3d, r7}}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fsmagic={'fsmagic', 0x3d, 0x7fff}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, '\\{'}}, {@permit_directio}, {@subj_role={'subj_role', 0x3d, 'pcr'}}]}}) mount$fuse(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000002140), 0x1080000, &(0x7f0000002180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}], [{@audit}, {@uid_lt={'uid<', r4}}, {@obj_role={'obj_role', 0x3d, ']&$/+]}{]\xe1\x00'}}, {@pcr={'pcr', 0x3d, 0x2e}}, {@appraise}, {@subj_type={'subj_type', 0x3d, 'fuse\x00'}}, {@dont_hash}, {@seclabel}]}}) r9 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r9]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000120000018000000", @ANYRES32, @ANYRES32=r0, @ANYRES32=r9, @ANYBLOB='./file0\x00']) r10 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r11 = openat$zero(0xffffffffffffff9c, &(0x7f00000022c0), 0x20000, 0x0) r12 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r13 = getuid() r14 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_id=', @ANYRESDEC=r14]) r15 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r15, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r15, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r16, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_ENTRY(r11, &(0x7f0000002300)={0x90, 0xfffffffffffffff5, r16, {0x2, 0x1, 0xff, 0x1ff, 0x200, 0xfffff3a4, {0x4, 0x80, 0x5, 0x754, 0x2, 0x3f, 0x10000004, 0x2, 0x7fffffff, 0x6000, 0xe1c0, r13, 0xffffffffffffffff, 0x32, 0x8}}}, 0x90) read$FUSE(r10, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r10, &(0x7f0000000000)={0x28}, 0x28) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x7) r1 = accept4$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80000) recvmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@can, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)=""/46, 0x2e}], 0x1}, 0x101c1) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000002240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000021c0)={r2}, 0x8) write$FUSE_OPEN(r3, &(0x7f0000002200)={0x20, 0x0, 0x0, {0x0, 0x2}}, 0x20) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) socketpair(0x27, 0x800, 0xd85, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002180), 0x345000, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f00000000c0), &(0x7f0000002140)='./file1\x00', 0x8, 0x0) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000002240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000021c0)={r2}, 0x8) write$FUSE_OPEN(r3, &(0x7f0000002200)={0x20, 0x0, 0x0, {0x0, 0x2}}, 0x20) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) socketpair(0x27, 0x800, 0xd85, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002180), 0x345000, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f00000000c0), &(0x7f0000002140)='./file1\x00', 0x8, 0x0) 21:36:41 executing program 5: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2, 0x8b}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000002180)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {0x2, 0x4}}, './file1\x00'}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) acct(&(0x7f0000002200)='./file0\x00') read$FUSE(r2, &(0x7f0000000100)={0x2020}, 0x2020) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xfffffffffffffff5, 0x0, {{0x6, 0x20000000008b, 0x2, r2}}}, 0x28) 21:36:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) readlink(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)=""/234, 0xea) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240), 0x200068, &(0x7f0000000280)={'trans=xen,', {[{@access_client}, {@cachetag={'cachetag', 0x3d, '\x00'}}, {@access_client}, {@access_any}, {@access_client}, {@debug={'debug', 0x3d, 0x7}}, {@noextend}, {@access_user}, {@uname={'uname', 0x3d, '\x00'}}], [{@seclabel}]}}) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)=@v2={0x2000000, [{0x0, 0x100}, {0x2, 0x5}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 5: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2, 0x8b}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000002180)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r0, {0x2, 0x4}}, './file1\x00'}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) acct(&(0x7f0000002200)='./file0\x00') read$FUSE(r2, &(0x7f0000000100)={0x2020}, 0x2020) [ 2988.563591] Process accounting resumed 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0\x00'}) write$FUSE_LK(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0xffffffffffffffff}}}, 0x28) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000002100)={{0x1, 0x1, 0x18, r5, {0x6}}, './file0\x00'}) 21:36:41 executing program 1: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="2e2f6669a8b96c653000"]) r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_PIE_ON(r0, 0x7005) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0x30) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) pipe2$9p(&(0x7f0000000040), 0x4000) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:41 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) pipe2$9p(&(0x7f0000000040), 0x4000) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) [ 2988.689204] Process accounting resumed 21:36:41 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffffe, 0x0, {{0x0, 0x0, 0x1}}}, 0x28) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}}}, 0x128) 21:36:41 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000100)) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2, r3}}, './file0\x00'}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(r4, &(0x7f0000002140)={0x118, 0x0, r6, [{0x4, 0x7, 0x1, 0x5a3, '\x00'}, {0x3, 0x5, 0x8, 0x3, '[{-\xcf]-$%'}, {0x5, 0x4, 0x3, 0x0, '}D/'}, {0x5, 0x8000000000000000, 0x0, 0x2d4b}, {0x6, 0x8000000000000001, 0x2, 0x10000, '+$'}, {0x6, 0x1, 0x0, 0xec58}, {0x1, 0x5, 0x7, 0x5, '^@]\\:\'!'}, {0x6, 0x8, 0x2, 0xc895, '\xfd)'}, {0x4, 0x5}]}, 0x118) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$FUSE_IOCTL(r7, &(0x7f0000002280)={0x20, 0x0, r1, {0x9457, 0x0, 0x9d, 0x3f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r8 = syz_genetlink_get_family_id$team(&(0x7f0000002300), r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r9, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r9, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r10, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r10, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000002340)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002380)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002440)={'syztnl0\x00', &(0x7f00000023c0)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x7, 0x4, 0x5a, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x7800, 0x8, 0x2, 0x7fffffff}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'syztnl0\x00', 0x0, 0x29, 0x80, 0x1f, 0x0, 0x20, @mcast1, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x20, 0x700, 0x9, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000025c0)={'ip6_vti0\x00', &(0x7f0000002540)={'ip6gre0\x00', 0x0, 0x2f, 0x3, 0x1, 0x2, 0x2, @loopback, @private0, 0x700, 0x8, 0xfffff198, 0x7fffffff}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r16, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r16, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000002600)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000026c0)={'syztnl2\x00', &(0x7f0000002640)={'ip6_vti0\x00', 0x0, 0x2f, 0x80, 0x81, 0x8, 0x1c, @mcast2, @private1, 0x710, 0x7, 0x9, 0x2a4}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000032c0)={&(0x7f00000022c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000003280)={&(0x7f0000002700)={0xb58, r8, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r9}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x1000, 0x4e, 0x69, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffff001}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x1d0, 0x2, 0x0, 0x1, [{0x64, 0x1, @lb_tx_method={{}, {}, {0x0, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x3f, 0x5, 0x8, 0x7f}, {0x3, 0x1, 0x7f, 0xffff}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r12}, {0xc0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8d5e}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xd0}}, {0x8}}}]}}, {{0x8}, {0x10c, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {}, {0x24, 0x4, [{0xf200, 0x74, 0x8, 0x6}, {0x4, 0x3, 0x5}, {0x3b, 0x1, 0x81, 0x200}, {0x1b03, 0x0, 0x7, 0x80000000}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r16}, {0x258, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x160, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x8, 0x7, 0x2}, {0x3, 0xa7, 0x1f, 0x7}, {0xfffb, 0x81, 0x1, 0x400}, {0x3, 0x2, 0x4, 0x2e9a}, {0x8001, 0xff, 0x0, 0xab}, {0x400, 0xc0, 0xff, 0xfff}, {0x1, 0x2, 0x0, 0x7fff}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x68}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1b}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @priority={{{}, {}, {0x0, 0x4, 0x7}}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}]}, 0xb58}, 0x1, 0x0, 0x0, 0x80}, 0x20000040) 21:36:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x5, {"b2c976b98baf52f1e41017290131655e"}, 0x9, 0xb5fb, 0x1f}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:41 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x108) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:41 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000002140), 0x32080, &(0x7f0000002180)={'trans=xen,', {[{@version_u}, {@debug={'debug', 0x3d, 0xc0}}, {@noextend}], [{@flag='dirsync'}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffff}}, {@fowner_lt={'fowner<', r1}}]}}) lsetxattr(&(0x7f0000002200)='./file0\x00', &(0x7f0000002240)=@random={'osx.', 'version=9p2000.u'}, &(0x7f0000002280)='\x00', 0x1, 0x0) 21:36:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x7, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:41 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2a, 0x6, 0x0, {0x2, 0x3, 0x1, 0x0, '\x00'}}, 0x2a) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:42 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2a, 0x6, 0x0, {0x2, 0x3, 0x1, 0x0, '\x00'}}, 0x2a) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:42 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = getpgid(0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xffffffff, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvravL'], 0xe}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x2, r2}}}, 0x28) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) write$FUSE_DIRENT(r4, &(0x7f00000021c0)=ANY=[@ANYBLOB='P\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=r1, @ANYBLOB="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"], 0x50) 21:36:42 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="78000000daffffff", @ANYRES64=r2, @ANYBLOB="0200000000000000744000000000000000000000d80b00000500000000000000aafd000000000000000000000200000005000000000000000000000000000000030000000800000040fa28000000000006000000000000000800"/102], 0x78) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002100), 0x400, 0x0) write$FUSE_ENTRY(r5, &(0x7f0000004180)={0x90, 0x0, r1, {0x2, 0x3, 0xd5, 0x9, 0x7fffffff, 0x0, {0x2, 0x2, 0x6, 0x7ff, 0x7bd950c8, 0xffffffff, 0x0, 0x1, 0x7fff, 0xc000, 0x7f, r3, r4, 0xae, 0x3}}}, 0x90) 21:36:42 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:42 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e22, 0x800, @mcast1, 0xfffff001}}}, 0xa0) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) mount$fuse(0x0, &(0x7f0000002140)='./file0\x00', &(0x7f0000002180), 0x2000a, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@fsmagic={'fsmagic', 0x3d, 0x6b89}}]}}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) utimensat(r1, &(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)={{0x77359400}}, 0x0) write$yama_ptrace_scope(r7, &(0x7f0000000040)='1\x00', 0x2) 21:36:42 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x0, 0x3}}, 0x29) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:42 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x0, 0x3}}, 0x29) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) [ 2989.191328] kauditd_printk_skb: 24 callbacks suppressed [ 2989.191341] audit: type=1804 audit(1677793002.211:2507): pid=25745 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13361/file0" dev="sda1" ino=14259 res=1 21:36:42 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_PIE_OFF(r2, 0x7006) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000110000018000000", @ANYRES32=r5, @ANYBLOB="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"]) 21:36:42 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_PIE_OFF(r2, 0x7006) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000110000018000000", @ANYRES32=r5, @ANYBLOB="de683d31ba0a3c2175af5c665f8d91a37967ebcf655205e746172f5d4163c49d077ea680d4dfaa261cd9a4dcb97281eede41dbf94c877a3525f2193a9271f44b208ce587e4364741b835ad30133d34b427d6574817561d839705a1eeae76afd975fe96fdbec36b9d06ed85fd79b747efb7323f961bba3a143910da94c2bd68133c8fff308869c33e44dd2b78594114c598d90b256bc181a75253f50e8d95fd0ba50e7408d7cb193b2967b5716655aaea85e313fe1a6019e4926a78ff365ed5561cd2cdadbbf22d2a211d718195030d6644834e76ef46971ecf60cd7bfd5246353319adabc4c3c4ce8c23f30da132b6ecd7d87d8e04774dbc02a57a739eda7f27ca0e342d555d709bb31c82d524a138302f1ccfe5ae53184878b3660a0ed7bd5e7e85923f1e27524120ca9a3993cbae35aa3a32ea5a8ee3527803437ce8"]) 21:36:42 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) recvmsg(r0, &(0x7f00000024c0)={&(0x7f0000002140)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f00000021c0)=""/163, 0xa3}, {&(0x7f0000002280)=""/118, 0x76}, {&(0x7f0000000040)=""/6, 0x6}, {&(0x7f0000002300)=""/203, 0xcb}], 0x4, &(0x7f0000002400)=""/191, 0xbf}, 0x40000000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000004540)={0x20, 0xffffffffffffffda, r2, {0x0, 0x1a}}, 0x20) [ 2989.244355] audit: type=1804 audit(1677793002.241:2508): pid=25745 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13361/file0" dev="sda1" ino=14259 res=1 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}}}, 0xa0) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0xea60}}, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r4}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8, @loopback}, r1}}, 0x30) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000180)=0x9) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r1}}, 0x30) 21:36:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:42 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x4, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r4}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8, @loopback}, r1}}, 0x30) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000180)=0x9) 21:36:42 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000002140)=0x0, &(0x7f0000002180)=0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f00000021c0)={0xfffffffffffffdc4, 0xfffffffffffffff5, r5}, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002200)={{0x1, 0x1, 0x18, r0, {0xf3}}, './file0\x00'}) read$FUSE(r3, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004280), &(0x7f00000042c0), &(0x7f0000004300)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004340)={{0x1, 0x1, 0x18, r0, {r9, r6}}, './file0/../file0\x00'}) r14 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r15 = getuid() r16 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r14, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r15, @ANYBLOB=',group_id=', @ANYRESDEC=r16]) read$FUSE(r4, &(0x7f0000004380)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r19 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r20 = bpf$ITER_CREATE(0x21, &(0x7f00000069c0)={r14}, 0x8) write$FUSE_STATFS(r20, &(0x7f0000006a00)={0x60, 0x0, r17, {{0xffffffff, 0x1000, 0x35a9, 0x80, 0xffffffffffffffff, 0xe39, 0x3}}}, 0x60) r21 = getuid() r22 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r19, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r21, @ANYBLOB=',group_id=', @ANYRESDEC=r22]) r23 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r24 = getuid() r25 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r23, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r24, @ANYBLOB=',group_id=', @ANYRESDEC=r25]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000063c0)={{0x1, 0x1, 0x18, r3, {0xee01, r6}}, './file0\x00'}) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x5b8, 0x0, r11, [{{0x0, 0x2, 0x3, 0x1, 0xfffff7ba, 0x80000000, {0x0, 0x8, 0x4, 0x1, 0x3, 0x8, 0xca6, 0x0, 0x2, 0x1000, 0x3, r12, r2, 0x8}}, {0x2, 0x1, 0x4, 0x6, '\\:]\x0e'}}, {{0x3, 0x1, 0x7ff, 0x3, 0x2, 0x42, {0x3, 0x0, 0x3, 0x7, 0x10000, 0xfffffffffffffc4b, 0x1000, 0x4, 0x1000, 0x0, 0x200, r8, r6, 0x7, 0xd6}}, {0x3, 0x3, 0xa, 0x8, '/dev/cuse\x00'}}, {{0x6, 0x0, 0x8, 0x7, 0x3, 0x2, {0x4, 0x0, 0x2, 0x1, 0x3, 0x9, 0x1225, 0x4, 0x5, 0xd000, 0x2, r1, 0xee00, 0x4}}, {0x0, 0x0, 0x0, 0x6ea}}, {{0x2, 0x1, 0x6, 0x8000, 0x9e, 0x8759, {0x1, 0x8, 0x8, 0x7fffffffffffffff, 0x235a09d2, 0x1, 0x1, 0x5, 0x7ff, 0x4000, 0x0, r9, r2, 0x0, 0xffffffff}}, {0x3, 0x3, 0x3, 0x480000, '$[,'}}, {{0x0, 0x1, 0x40, 0x1, 0x14000, 0x5, {0x2, 0x302, 0x9, 0x80, 0x6, 0x800, 0x1f, 0x5, 0x4, 0x1000, 0xac, r13, r2, 0x81}}, {0x2, 0x7ff, 0x0, 0x49d}}, {{0x4, 0x1, 0xff, 0x226f, 0xfffeffff, 0x6, {0x1, 0x3, 0x7f, 0x6, 0x1, 0x2, 0xfffffffa, 0x9, 0x3bc, 0xa000, 0x8001, r15, r18, 0x10001, 0xf5a9}}, {0x1, 0x80, 0x1, 0x400, 'X'}}, {{0x6, 0x0, 0xffffffffffffff01, 0x7, 0x9, 0x4, {0x6, 0x8c, 0x5, 0xffffffffffffffff, 0x9, 0xfffffffffffffffc, 0x9, 0x100, 0xffffff90, 0x8000, 0x1, r7, r6, 0x1, 0x3}}, {0x1, 0x7fffffff, 0x4, 0x0, '{^${'}}, {{0x4, 0x1, 0x0, 0x1cb4, 0xc5850433, 0x8, {0x5, 0xbdf, 0x4, 0x81, 0x800, 0x1a, 0xff, 0x5, 0x400, 0x8000, 0x0, r21, r25, 0x100, 0x800}}, {0x1, 0x464, 0xa, 0x80000000, '/dev/cuse\x00'}}, {{0x4, 0x1, 0x7, 0x3089, 0x100, 0x7, {0x1, 0x20, 0x800, 0x5, 0x100000001, 0x5, 0xc8d0, 0xa873, 0x5, 0x1000, 0x101, r26, r6, 0x80000001, 0x41}}, {0x3, 0x0, 0xa, 0x5, '/dev/fuse\x00'}}]}, 0x5b8) 21:36:42 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000004180)={0x2b, 0x6, 0x0, {0x5, 0x2, 0x2, 0x0, '},'}}, 0x2b) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r4}}}, 0x28) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r7 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r7, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r7, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r8, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) getresuid(&(0x7f00000041c0)=0x0, &(0x7f0000004200), &(0x7f0000004240)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004280)={{0x1, 0x1, 0x18, r5, {r2, r3}}, './file0\x00'}) r11 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r12 = getuid() r13 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYRESDEC=r13]) write$FUSE_DIRENTPLUS(r6, &(0x7f00000042c0)={0x1f8, 0x0, r8, [{{0x5, 0x0, 0x0, 0x1, 0xff, 0x1f, {0x4, 0xfffffffffffffffb, 0x0, 0x13f0, 0x5, 0x2, 0x1, 0x76, 0x0, 0x1000, 0x8, r9, r1, 0x1, 0xcd3e}}, {0x3, 0x20, 0x2, 0x0, '\\.'}}, {{0x6, 0x3, 0x401, 0x4, 0x2, 0x378, {0x1, 0x2, 0x80000000, 0x1000000000000, 0x4, 0x6, 0x5, 0x0, 0x1, 0x0, 0x4, r10, r1, 0x0, 0x1}}, {0x3, 0x8000000000000000, 0x2, 0x5, '},'}}, {{0x4, 0x0, 0x5, 0x0, 0x400, 0x6, {0x1, 0x9, 0x2, 0x100000001, 0x0, 0x8, 0x1f, 0xed, 0x200, 0xc000, 0x9, r12, r1, 0x1, 0x1ff}}, {0x3, 0x9, 0xa, 0x6fb9, '/dev/fuse\x00'}}]}, 0x1f8) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r4}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8, @loopback}, r1}}, 0x30) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000180)=0x9) 21:36:42 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x7ff, 0x2, "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", 0x0, 0x3, 0x11, 0x5, 0x20, 0x2, 0xfa, 0x1}}}, 0x128) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) [ 2989.573598] audit: type=1804 audit(1677793002.591:2509): pid=25803 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13364/file0" dev="sda1" ino=14288 res=1 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x30) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) [ 2989.625333] audit: type=1804 audit(1677793002.601:2510): pid=25803 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13364/file0" dev="sda1" ino=14288 res=1 21:36:42 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) mount$fuse(0x0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0), 0x140080, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x9e}}], [{@euid_eq={'euid', 0x3d, r4}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@subj_role}, {@smackfshat={'smackfshat', 0x3d, '<'}}, {@fowner_lt={'fowner<', 0xee00}}, {@context={'context', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/cachefiles\x00'}}]}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000020c0)) r7 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r8 = getuid() r9 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r8, @ANYBLOB="c9d70700000000000000dfb1ffa4ac69309e744e5b8de3a2e22bd8ea27149285a098eba7eb1f253c25ece7e628a3c1235d2ccc930a333c010d23e506c2168fead9ba3f19f9514e2a951da5f78ee090fe91907b50b77c53995d2b28ffc769d1933a3beb659ca2db432520967971d067afdac126f4dd0b51435d7337a12b5f3aa6abe05632468a14a55be6e388167f7e0ca63d5c344e2c128379324bf7527de75cb1c9dc6d9d1fd3891af7fddb8c7e0af1c177ec87b6aa1af0fab8bbc8c1a1fed15a4e6a123d14a23830be201b91fd48deaa1f70e4a662eb0ccfe602590f03765d0f54149637e6e75cd6c037043b80b8f1d1c9ff320b103683691d29df51752d46b76d1fc2a051cb9f67f5731ab4e8cc48fe7082cd2173010054b3c5d4a953b500"/297, @ANYRESDEC=r9]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0xee00, r9}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r1, r10, 0x0, r1}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r7, 0xc0189378, &(0x7f0000000700)={{0x1, 0x1, 0x18, r11, {r6}}, './file0/file0\x00'}) r12 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r12, {r13}}, './file0\x00'}) accept(r13, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000200)=0x80) 21:36:42 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2989.673450] audit: type=1804 audit(1677793002.601:2511): pid=25803 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13364/file0" dev="sda1" ino=14288 res=1 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 21:36:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) [ 2989.715580] audit: type=1804 audit(1677793002.691:2512): pid=25815 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir48631011/syzkaller.jNse3L/14395/file0" dev="sda1" ino=14241 res=1 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r4}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8, @loopback}, r1}}, 0x30) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000001c0)) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x745, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:42 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0xfffffffb, @dev={0xfe, 0x80, '\x00', 0x27}, 0x7}, r1}}, 0x38) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x306, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:42 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r4}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8, @loopback}, r1}}, 0x30) 21:36:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff, [0x4, 0x6, 0x7, 0x4]}}) 21:36:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x5c, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff, [0x4, 0x6, 0x7]}}) 21:36:43 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0xfffffffb, @dev={0xfe, 0x80, '\x00', 0x27}, 0x7}, r1}}, 0x38) 21:36:43 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r3}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x800, @empty, 0x245}, r3}}, 0x30) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0xe5, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)='./file0\x00', 0x8, 0x2) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x8, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff, [0x4, 0x6]}}) 21:36:43 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x0, 0x3d8, 0x0, 0x3d8, 0x2e0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x6, 0x0, {[{{@ipv6={@loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'veth0_to_bond\x00', 'veth0_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x3}}}, {{@ipv6={@loopback, @private2, [], [], 'ip6erspan0\x00', 'batadv_slave_0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@multicast2}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28}, {"9e16"}}]}, @HL={0x28}}, {{@ipv6={@loopback, @private0, [], [], 'veth1_to_hsr\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x600) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff, [0x4]}}) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xfffff801}}, './file0\x00'}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) [ 2990.212894] xt_HL: invalid or unknown mode 3 21:36:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1ff}}) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xfffff801}}, './file0\x00'}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1}, r1}}, 0x128) 21:36:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0xfffffffffffffe48) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xfffffffffffffffe}, 0x28) 21:36:43 executing program 1: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) 21:36:43 executing program 1: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0xaafc, 0x5, 0xf1, 0x1, 0x4, 0x7, 0x7f}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000004180)={0x5, 0xffff7fff, 0x0, 0x5, 0xbe, 0x7fffffff}) write$FUSE_LK(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x200000005, 0x80000000, 0x0, r1}}}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 1: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) 21:36:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 1: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 21:36:43 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 1: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4, 0x10000]}}) 21:36:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f43, 0x141) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000001e4000036000000", @ANYRES32=r0, @ANYBLOB="ffffffff080000002e2f666977043d72"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r2, @ANYBLOB="000000002ee766696c6530003792cdc239bda704b8303b79a7ffa3b0c8ad15049d6e1e1431309e2a694179ac3418b37e960bd6c27d5f867362cea91d148cd938f5131b57713eebcfcc53a040625fdcee65c055a88dcfbda2a4783767a471c9686b24fe8798aff20d7f1079ac31513d805dbb4d7cee36b102bd6287eab41e495bcd4f6ab9e75ad94c1b4cdadcd81d7913c448056ee11831e2e24cfb"]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)) r3 = accept(0xffffffffffffffff, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000180)=0x80) sendmsg$can_bcm(r3, &(0x7f0000000580)={&(0x7f0000000480), 0x10, &(0x7f0000000540)={&(0x7f00000004c0)={0x5, 0x320, 0x101, {}, {0x77359400}, {0x2, 0x0, 0x1}, 0x1, @canfd={{0x0, 0x1}, 0x17, 0x3, 0x0, 0x0, "a8ef77e7aa9532ebf1875e581b20d6e4cb816034d9378cb94f1166cbd833b505fd7a362f8f0600b9c70ac146b16b0e14e6ca249f0e1f8acda1777810b9252b9e"}}, 0xfffffe72}, 0x1, 0x0, 0x0, 0x20040805}, 0x4088090) accept(0xffffffffffffffff, &(0x7f0000000080)=@qipcrtr, &(0x7f0000000000)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x7892}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000600)={{0x1, 0x1, 0x18, r4, {0x7}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r8}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000640)={0x7, 0x8, 0xfa00, {r8, 0x1b}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r3, {r5, 0xee01}}, './file0\x00'}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x4, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x2, 0x10001, {"85ed43279a8c12e25e72daceff8481f3"}, 0x7, 0x6, 0x200000000000000}}}, 0xa0) 21:36:43 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0xffffffffffffff37, 0xfffffffffffffffc) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 21:36:43 executing program 1: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:43 executing program 5: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r8}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679"}, r1}}, 0x128) 21:36:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "819528f0011ee70802219d5165b084724e75b8c4f96087c3617665cd30202a5399951f9e8b39e537b419709c9fe52d1dd42afc777ea10628a01c8c83e6cc2e4b230b6ce4df853589cfe50dacd09caaea06d91658ad6cf1836025092a639886ce21a17442f7df62e66007e3a12e8706c03d30f8918de68262796bca051807532290c4d5c63da9037bb9a3e4471c71787c11739c36078765cd22cc17a3e3448e48812940e30648ed27b6fdc0b264082bb258424b44c27b0d91553d94d4490d6651f12d0f839ad7426ce387353dbfd4fc3fd0c74640063d4de5fedfe2f601b64e2d209de78e3d17595d5c1b53c20c077353bb073c49a55d31f9779fcfedc5f9c679"}, r1}}, 0x128) 21:36:43 executing program 5: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r5}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000002180)={0x16, 0x98, 0xfa00, {&(0x7f0000002140), 0x1, r5, 0x10, 0x1, @ib={0x1b, 0xffa7, 0x2, {"36e7529d7d56afedba68464cba5d218e"}, 0x2, 0x0, 0x4}}}, 0xa0) write$FUSE_IOCTL(r2, &(0x7f0000000040)={0x20, 0x0, r1, {0x8, 0x4, 0x20, 0x400}}, 0x20) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r8}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) 21:36:43 executing program 5: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:43 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:43 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r7, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r8}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000001a00)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) 21:36:44 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x382000, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r3 = syz_open_dev$rtc(&(0x7f00000020c0), 0x7, 0x80000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000006340)={0x7f, 0xff, 0x6, 0x4, 0x8, 0x84, 0x43957f83}) write$FUSE_ENTRY(r0, &(0x7f0000000100)={0x90, 0x0, r2, {0x6, 0x3, 0x7fffffff, 0x5, 0x80000000, 0x5ca79278, {0x3, 0x6, 0x0, 0x1, 0x0, 0x5, 0x4, 0x2220, 0x7ff, 0x1000, 0x9, r4, 0xee00, 0x7f, 0xfffffffb}}}, 0x90) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000006380)='./cgroup/syz1\x00', 0x200002, 0x0) read$FUSE(r1, &(0x7f0000004200)={0x2020}, 0x2020) mount$fuseblk(&(0x7f0000002100), &(0x7f0000002140)='./file1\x00', &(0x7f0000002180), 0x80200d, &(0x7f0000006240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[], [{@fsmagic}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, '/@%}-\\@'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, 0x0, @b}, 0x48, 0xfffffffffffffffc) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', 0x0}) 21:36:44 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xffffffffffffffff}}, './file0\x00'}) ioctl$RTC_VL_CLR(r2, 0x7014) r3 = accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80800) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x2042, 0x0) write$FUSE_DIRENT(r5, &(0x7f0000000280)={0x30, 0xfffffffffffffff5, 0x0, [{0x2, 0x8f35, 0x5, 0x9da, 'syz1\x00'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000020c0)) accept4(r6, &(0x7f0000000300)=@x25, &(0x7f0000000380)=0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000200)={0x7, 0x2, 0x4, 0xffff, 'syz1\x00', 0x81}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x0, 0xee01}}, './file0\x00'}) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7, 0x4]}}) 21:36:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6, 0x7]}}) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4, 0x6]}}) 21:36:44 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x0, [0x4]}}) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x9, 0x4, 0x6, 0x2, '\x00', 0x1000}) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}, {0x6}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_sset_info}) 21:36:44 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x40) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 5: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r1 = getuid() mount$fuseblk(&(0x7f00000025c0), &(0x7f0000002600)='./file0/file0\x00', &(0x7f0000002640), 0x100401, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfff}}], [{@euid_gt={'euid>', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x66b}}, {@subj_type={'subj_type', 0x3d, 'permit_directio'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) r2 = geteuid() stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f0000002400), 0x104000, &(0x7f00000027c0)=ANY=[@ANYBLOB='trans=xen,cache=mmap,cache=loose,mmap,euid>', @ANYRESDEC=r2, @ANYBLOB="2c61707072616901655f747970653d696d617369672c7569643eb6152f37192ad20ba665e8dd0b59277f1a43ef64e99b843c0e9286b9f6782b9d", @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=dont_appraise,fsname=func,async,permit_directio,smackfsdef=)(,\x00']) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000002300)=""/250) r4 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r4, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$nfs4(&(0x7f0000000000)='\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB="002c002c0082550b77406159e8aa000000914986be6a0ca19dc1e606000000000000b3b1006e86f371a0a300ab62ca43c37f6e740a29750e183ea44c4c974d682bb9cf07fffc0e6a5f726f6c653d002c666f776e", @ANYRES32=r5, @ANYBLOB=',fsname=,dont_appraise,func=MMAP_CHECK,fsname=\x00,obj_role=\x00,\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 2: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r1 = getuid() mount$fuseblk(&(0x7f00000025c0), &(0x7f0000002600)='./file0/file0\x00', &(0x7f0000002640), 0x100401, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfff}}], [{@euid_gt={'euid>', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x66b}}, {@subj_type={'subj_type', 0x3d, 'permit_directio'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) r2 = geteuid() stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f0000002400), 0x104000, &(0x7f00000027c0)=ANY=[@ANYBLOB='trans=xen,cache=mmap,cache=loose,mmap,euid>', @ANYRESDEC=r2, @ANYBLOB="2c61707072616901655f747970653d696d617369672c7569643eb6152f37192ad20ba665e8dd0b59277f1a43ef64e99b843c0e9286b9f6782b9d", @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=dont_appraise,fsname=func,async,permit_directio,smackfsdef=)(,\x00']) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000002300)=""/250) r4 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r4, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$nfs4(&(0x7f0000000000)='\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB="002c002c0082550b77406159e8aa000000914986be6a0ca19dc1e606000000000000b3b1006e86f371a0a300ab62ca43c37f6e740a29750e183ea44c4c974d682bb9cf07fffc0e6a5f726f6c653d002c666f776e", @ANYRES32=r5, @ANYBLOB=',fsname=,dont_appraise,func=MMAP_CHECK,fsname=\x00,obj_role=\x00,\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) 21:36:44 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x8, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="061f"]) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000180)={0x27, 0x10, 0x15, 0x11, 0x0, 0x1, 0x0, 0x12f}) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0\x00'}) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) syz_fuse_handle_req(r4, &(0x7f0000002140)="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", 0x2000, &(0x7f0000004780)={&(0x7f0000004140)={0x50, 0x0, 0xffffffffffffb63b, {0x7, 0x26, 0xffffffc0, 0x6000, 0x40, 0x5, 0x1, 0x9}}, &(0x7f00000000c0)={0x18, 0x0, 0xff, {0x4}}, &(0x7f00000041c0)={0x18, 0x0, 0x10001}, &(0x7f0000004200)={0x18, 0x0, 0x3f, {0x40}}, &(0x7f0000004240)={0x18, 0xffffffffffffffda, 0x2, {0x4}}, &(0x7f0000004280)={0x28, 0xfffffffffffffffe, 0x6, {{0x8, 0x3, 0x1, r3}}}, &(0x7f00000042c0)={0x60, 0x0, 0x12000000000, {{0x5, 0x2, 0x973a, 0x94cd, 0xffffffffffffffe1, 0xfffffff7, 0x47, 0x20}}}, &(0x7f0000004340)={0x18, 0x0, 0xfffffffffffffff7}, &(0x7f0000004380)={0x12, 0x0, 0xdd, {'^\x00'}}, &(0x7f00000043c0)={0x20, 0xfffffffffffffff5, 0x4, {0x0, 0x14}}, &(0x7f0000004400)={0x78, 0x0, 0x5, {0x8, 0x4, 0x0, {0x4, 0x1000, 0x847, 0xfffffffffffffff8, 0x3, 0x0, 0x86e, 0xf92, 0x400, 0xc000, 0x101, r6, 0xffffffffffffffff, 0x9, 0x2}}}, &(0x7f0000004480)={0x90, 0x0, 0x80, {0x4, 0x1, 0x8, 0x8000, 0x9d, 0x7, {0x2, 0x20, 0x0, 0x9, 0x7, 0x8, 0xf5b, 0x7fffffff, 0x1, 0x2000, 0x7fffffff, r1, r2, 0x5, 0x40}}}, &(0x7f0000004540)={0x50, 0x0, 0x8, [{0x2, 0x8, 0x6, 0x6, '@**^+}'}, {0x5, 0x1000, 0x2, 0x100, '$)'}]}, &(0x7f00000045c0)={0xb8, 0x0, 0x10000, [{{0x6, 0x0, 0x100000000, 0x1000, 0x5, 0x401, {0x2, 0x5, 0x8, 0x20, 0x7, 0x9, 0x6, 0xc, 0x6, 0xa000, 0x74, r1, r2, 0x7ff, 0x9}}, {0x6, 0xc59, 0xb, 0x8, '!.\'*[-#\xe6\xcf*@'}}]}, &(0x7f0000004680)={0xa0, 0x0, 0x5, {{0x5, 0x1, 0x2, 0xfff, 0x8, 0x7, {0x5, 0xfffffffffffffff9, 0xc9a9, 0x79, 0x400, 0x7fffffff, 0xfff, 0x82, 0x3, 0x6000, 0x6, 0xee00, r2, 0x2, 0x9}}, {0x0, 0x18}}}, &(0x7f0000004740)={0x20, 0x0, 0xffffffff, {0x3, 0x0, 0xffff, 0x5}}}) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) read$FUSE(r0, 0x0, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2991.653526] audit: type=1804 audit(1677793004.671:2513): pid=26190 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13889/file0" dev="sda1" ino=13895 res=1 21:36:44 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r7, 0x40405514, &(0x7f0000002180)={0x1, 0x0, 0x80000001, 0x8, 'syz1\x00', 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000740)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0f000000000000002e2f66696c6530009fd3be08ac03a3dd033fc84849275f94e493f9195c2c333f5ccd1e690faeeced68cadd515dae6b3853f0776edfeb0c0725b7427f58cc6c03525878b188001a9cff5d176cdaecee6f134fe77db9f3c2ea0dd94b3155d6f7c9090e40b3fa2da242f159245d142d9ad0a20957d7f75fd44041dd49c3"]) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) unlinkat(r3, &(0x7f00000006c0)='./file0\x00', 0x200) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x2f, 0x7, 0x50, 0x4, 0x28, @remote, @local, 0x0, 0x10, 0xfffff114}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x2f, 0xe2, 0x8f, 0x3, 0x9, @private0, @empty, 0x10, 0x8000, 0x7ff, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x29, 0x2, 0x2, 0x80e2, 0x4, @local, @local, 0x7, 0x40, 0x7, 0x5}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x268, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}]}}, {{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x7, 0x2, 0x7}, {0x5, 0x9, 0x3, 0x2}, {0x7f, 0x8, 0x3, 0x4}, {0xd19b, 0x5, 0x9, 0x1000}, {0x1, 0xff, 0xff, 0x3}, {0x647c, 0x9, 0x3, 0x4}, {0x2d0e, 0x5, 0x0, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xa}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x268}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000700)) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0fc2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:44 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0fc2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x77, 0x8001}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x4, {0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4b}, r1}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0fc0, 0x2) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002140), 0xbb5a778aaad828fa, 0x0) accept4(r1, &(0x7f0000002180)=@nl=@proc, &(0x7f0000002200)=0x80, 0x80800) read$FUSE(r1, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000004280)={0x20, 0x0, r2, {0x0, 0x18}}, 0x20) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) stat(&(0x7f0000004340)='./file0\x00', &(0x7f0000004380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000004300), 0x20, &(0x7f0000004400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@default_permissions}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 21:36:44 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2={0x2000000, [{0x0, 0x8001}]}, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e23, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}}}, 0x38) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2081, 0x0) read$FUSE(r0, 0x0, 0x0) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e20, 0x10000005, @mcast1}}}, 0xa0) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) clock_getres(0x7, &(0x7f00000001c0)) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e20, 0x36, @empty, 0xffff}, r4}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) clock_getres(0x7, &(0x7f00000001c0)) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020}, 0x2020) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)={0x30, 0x0, r6, [{0x0, 0x5, 0x3, 0x5, '&**'}]}, 0x30) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) clock_getres(0x7, &(0x7f00000001c0)) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) 21:36:45 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r5, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) 21:36:45 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x4, 0x8, 0xffffffff, 0x80, 0x5, 0x5, 0xca32, 0xff}, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:45 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:45 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020}, 0x2020) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:45 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000040)={0x1, 0x100, 0x8, 0x6dac, 0x7f, 0x9, 0xb2f5, 0x4f}, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:45 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 2: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:45 executing program 5: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x100, 0xcd78, 0x3, 0x1, 0x8, 0x7f}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:45 executing program 2: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 5: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 2: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 21:36:45 executing program 5: r0 = open(0x0, 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:45 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x13f, 0x4}}, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x13f, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:45 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:46 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x13f, 0x4}}, 0x20) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:46 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:46 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:46 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:47 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:47 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 21:36:47 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:47 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 21:36:48 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(0x0, &(0x7f00000021c0), 0x0, 0x0, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e1f, 0x13, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x401}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000002140)={0x11, 0x10, 0xfa00, {&(0x7f0000002100), r3}}, 0x18) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020}, 0x2020) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x30) 21:36:48 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:48 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:48 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 21:36:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:48 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:48 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), &(0x7f0000002200)=@v2, 0x14, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:48 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:49 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000040)={0x28}, 0x28) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_OPEN(r0, &(0x7f0000002200)={0x20, 0xfffffffffffffff5, r5, {0x0, 0x5}}, 0x20) write$FUSE_LK(r2, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r3, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r6 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r7 = getuid() r8 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8]) write$FUSE_ENTRY(r0, &(0x7f0000002140)={0x90, 0x0, r3, {0x2, 0x1, 0xc9, 0x3, 0xfffffffd, 0x8000, {0x4, 0x7c8e, 0x88e, 0x1, 0x348e, 0x0, 0x7fffffff, 0x0, 0x9, 0xa000, 0x81, r1, r8, 0xb4, 0x100}}}, 0x90) 21:36:49 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:49 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) r5 = getuid() r6 = getuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000004200)={{0x1, 0x1, 0x18, r0, {0xee01, r3}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000004240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) stat(&(0x7f0000006280)='./file0\x00', &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r12 = getuid() r13 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYRESDEC=r13]) r14 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r14, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r11, &(0x7f0000006740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r14, &(0x7f0000008780)={0x60, 0x0, r15, {{0xd87, 0x64, 0x6, 0x7, 0x7, 0x3, 0xfffffffe, 0xc7a}}}, 0x60) write$FUSE_DIRENTPLUS(r0, &(0x7f0000006340)={0x3c8, 0x0, r4, [{{0x3, 0x3, 0x6, 0x8, 0x0, 0xa00000, {0x4, 0x6, 0x10001, 0xfffffffffffffff4, 0x5, 0x1, 0x98, 0x7, 0x1f, 0x2000, 0x9def, r5, 0x0, 0x3, 0x2ad7}}, {0x6, 0x7f, 0x2, 0x0, '/]'}}, {{0x3, 0x3, 0x5, 0x2, 0x6, 0x1ff, {0x4, 0x7ff, 0x1, 0x101, 0x84c2, 0x4, 0xa001, 0x81, 0x4, 0x4000, 0x7, r6, 0xee01, 0x9, 0x5}}, {0x1, 0x7ff, 0x1, 0x43955721, '{'}}, {{0x6, 0x1, 0x9b, 0x5, 0x80000001, 0x9cc, {0x3, 0xd124, 0x7fffffff, 0x8035, 0x401, 0x9, 0xd8, 0xfffffff8, 0x1, 0x0, 0x8001, r7, r8, 0x7, 0x400}}, {0x1, 0x4, 0x3, 0x8, '{}&'}}, {{0x3, 0x3, 0x0, 0x591, 0x9, 0xfff, {0x1, 0x80000001, 0x101, 0xc3fa, 0x0, 0x8000000000000000, 0x3, 0x7, 0x3, 0x0, 0x6, r2, r9, 0xfffffffe, 0xded}}, {0x1, 0x3, 0x4, 0x2, '*:\xe1\''}}, {{0x2, 0x2, 0x80000001, 0x6, 0x49c, 0x1, {0x6, 0x6, 0x100000000, 0x7, 0x6, 0x7, 0x1, 0x1ff, 0x2, 0x1000, 0x0, r2, r3, 0x100}}, {0x6, 0x1, 0x1, 0x5, '\''}}, {{0x1, 0x1, 0x1, 0x9, 0x2, 0xffff, {0x2, 0x1000000000, 0x45, 0x400, 0x7, 0xffffffff, 0x401, 0xffffffff, 0xffff, 0x6000, 0x0, r10, r13, 0x81, 0x6}}, {0x5, 0x6, 0x0, 0x4}}]}, 0x3c8) 21:36:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r1, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0xb6f, 0x3f, {"80a3e877920babeb3fcfc4362bf678aa"}, 0x5ba0, 0xffffffff, 0x1}, @ib={0x1b, 0x0, 0x5, {"7d7c879160559e3dc600f73099e88a4f"}, 0x0, 0x7, 0xffff}}}, 0x118) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) linkat(r3, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1400) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r4, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:49 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x1, 0x177d}}, './file0\x00'}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', r1, 0x4, 0x5, 0x80, 0x81, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x8, 0x80000000}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000080)={'syzkaller1', 0x32, 0x33}, 0xd) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:49 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 21:36:49 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r2, 0x2f, 0x1, 0x4, 0x65f, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r2, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r3, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r6, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r6, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000026c0)={&(0x7f0000002740)=ANY=[@ANYBLOB="00050000", @ANYRES16=0x0, @ANYBLOB="000426bd7000ffdbdf250300000008000100", @ANYRES32=r1, @ANYBLOB="f400028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004007c00000008000600", @ANYRES32=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000008040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="7c0002803c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400330b0001d78719273c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="300102803c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004008400000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400370f000008000100", @ANYRES32=r4, @ANYBLOB="2c0202803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="d863c00cd07a4e4305fd42080f7b92bec22c5ca4e2337c9c1de9d6bee4a525a45ff60daa5b4bfbd4a51921176c279056ad81ce65e8ecc31e583a3949860a4a20922d16e13b41ac27"], 0x500}, 0x1, 0x0, 0x0, 0xc841}, 0x20000800) r7 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r7, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r7, &(0x7f0000000000)={0x28}, 0x28) [ 2996.084571] audit: type=1804 audit(1677793009.101:2514): pid=26582 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13351/file0" dev="sda1" ino=14513 res=1 21:36:49 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r2, 0x2f, 0x1, 0x4, 0x65f, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r2, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r3, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r6, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r6, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000026c0)={&(0x7f0000002740)=ANY=[@ANYBLOB="00050000", @ANYRES16=0x0, @ANYBLOB="000426bd7000ffdbdf250300000008000100", @ANYRES32=r1, @ANYBLOB="f400028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004007c00000008000600", @ANYRES32=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000008040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="7c0002803c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400330b0001d78719273c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="300102803c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004008400000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400370f000008000100", @ANYRES32=r4, @ANYBLOB="2c0202803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="d863c00cd07a4e4305fd42080f7b92bec22c5ca4e2337c9c1de9d6bee4a525a45ff60daa5b4bfbd4a51921176c279056ad81ce65e8ecc31e583a3949860a4a20922d16e13b41ac27"], 0x500}, 0x1, 0x0, 0x0, 0xc841}, 0x20000800) r7 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r7, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r7, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) r2 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r3 = getpgid(0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000004180), r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000004240)={'syztnl2\x00', &(0x7f00000041c0)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x2b, 0x0, 0xc, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, 0x40, 0x0, 0x4e, 0x80}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004280)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000004740)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000004700)={&(0x7f00000042c0)={0x434, r5, 0x100, 0x70bd28, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x200, 0xfd, 0x80, 0x2}, {0x3, 0x1, 0x8, 0x9}, {0x7f, 0x8a, 0xfe, 0x2fe3}, {0x101, 0x1, 0x2, 0x97d}, {0x7, 0xff, 0x2, 0x7f5}, {0x3b2, 0x3, 0x3f, 0x9}, {0x3ff, 0x7, 0x7, 0x8}, {0x8, 0x1f, 0x2e, 0x7bb}]}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8}, {0xec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xbff5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r7}, {0x174, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xae13}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x9, 0x7f, 0x80, 0x1}, {0x40, 0x7, 0x0, 0x53b49550}, {0xff, 0x2, 0x0, 0x829}, {0xf801, 0x5, 0x5, 0x80}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4091}}}]}}]}, 0x434}, 0x1, 0x0, 0x0, 0x4000000}, 0x8048800) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r3, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, r1, {{0xb9, 0x6, 0x2, r3}}}, 0x28) 21:36:49 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r1, &(0x7f00000000c0)={0x2020}, 0x2020) ioctl$RTC_UIE_ON(r0, 0x7003) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) [ 2996.134050] audit: type=1804 audit(1677793009.131:2515): pid=26586 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13416/file0" dev="sda1" ino=14279 res=1 21:36:49 executing program 0: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x4001, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}}, 0xa0) 21:36:49 executing program 1: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000002140)=""/4096, 0x1000) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r1, &(0x7f00000000c0)={0x2020}, 0x2020) ioctl$RTC_UIE_ON(r0, 0x7003) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x8, 0x5, "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", 0x1f, 0x20, 0x0, 0x0, 0x3f, 0x20, 0x7, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r5, 0x10, 0x1, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) [ 2996.274328] audit: type=1804 audit(1677793009.291:2516): pid=26601 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2239497309/syzkaller.23IMBb/14384/file0" dev="sda1" ino=14562 res=1 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 3: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:49 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x1a1e82, 0x21) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @remote}, r2}}, 0x30) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, 0x1220}}, 0x18) 21:36:49 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000000c0)=""/105, 0x69) 21:36:49 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002640)=@known='user.incfs.size\x00') r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x418000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000002140)={{0x6, 0x0, 0x200, 0x3f, 'syz0\x00', 0xfff}, 0x1, [0x3, 0xffffffffffffff26, 0xb0bd2aa, 0x0, 0x7, 0x3f, 0x9, 0x1, 0x390, 0x58, 0xe8, 0x8, 0x4, 0x200, 0x7, 0x7a1, 0xffffffff, 0x9, 0x2, 0x20, 0x401, 0x6, 0x80000001, 0x40, 0x2, 0x3d6c, 0x8, 0x8, 0xaf, 0xd7d, 0x3f9b00000000000, 0x3f, 0x0, 0xffffffffffffffff, 0x5d3, 0x7fffffffffffffff, 0x0, 0xbcb, 0x10000, 0x7e3d, 0x3f, 0x8, 0x4, 0x81, 0x1fae, 0x42ed, 0x0, 0x1000, 0x100000000, 0x9, 0x80000001, 0x5, 0x100000000, 0x80000000, 0x3, 0x7, 0x3, 0x2, 0xffff, 0xc96, 0x1, 0x1ff, 0x3, 0x1, 0x3, 0x7fff, 0x9, 0x3, 0x1, 0xff, 0x2, 0x1000, 0x2, 0x5, 0x7, 0x4, 0x7ff, 0xd765, 0x1, 0x7, 0x80000001, 0x80000001, 0xff, 0x3, 0x6e22, 0x0, 0x39154dc9, 0x3, 0x8, 0x9, 0x1000, 0xe5, 0x9, 0x3, 0x7, 0xa87, 0x8, 0x7, 0x2, 0x1, 0x9, 0x6, 0x2, 0x0, 0x7, 0xe, 0x8000000000000001, 0xffffffffffff4c01, 0xe704, 0x56, 0x40, 0x80, 0x8, 0x3, 0x5, 0x7dd, 0xfffffffffffffff7, 0x1e, 0x5, 0x3c0, 0x400, 0x6, 0x2, 0xef8, 0x3a, 0x0, 0xba, 0x1000]}) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r1, &(0x7f00000000c0)={0x2020}, 0x2020) ioctl$RTC_UIE_ON(r0, 0x7003) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 2996.392051] audit: type=1804 audit(1677793009.411:2517): pid=26617 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2239497309/syzkaller.23IMBb/14385/file0" dev="sda1" ino=14258 res=1 21:36:49 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000002140)={0x0, 0xfb, 0x15, 0x2, 0xff, "7d3fa5208c0f811da3806e2edda69389"}, 0x15, 0x4) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xbf7}}, './file0\x00'}) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x5}}, './file0\x00'}) 21:36:49 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000002140)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4b, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x0, @local, 0x80000000}, @ib={0x1b, 0x3f, 0x7, {"bbd9f49616fcf2c66a60a2697b3ea547"}, 0x91, 0x80000000000000, 0x1}}}, 0x118) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002140)={{0x1, 0x1, 0x18, r0, {r3, r4}}, './file0\x00'}) r6 = getuid() r7 = getuid() mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x214010, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[{@blksize}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@seclabel}, {@euid_gt={'euid>', r3}}, {@permit_directio}, {@euid_eq={'euid', 0x3d, r7}}, {@smackfsdef={'smackfsdef', 0x3d, '/^:!\',@+^\x00'}}]}}) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000022c0)={r0}, 0x8) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r9, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r10, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(r8, &(0x7f0000002300)={0x50, 0x0, r10, [{0x4, 0xffff, 0x6, 0x2, 'fowner'}, {0x1, 0x5, 0x1, 0xfffffff9, ','}]}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x0, 0x12}}, 0x20) 21:36:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002140)={{0x1, 0x1, 0x18, r0, {r3, r4}}, './file0\x00'}) r6 = getuid() r7 = getuid() mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x214010, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[{@blksize}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@seclabel}, {@euid_gt={'euid>', r3}}, {@permit_directio}, {@euid_eq={'euid', 0x3d, r7}}, {@smackfsdef={'smackfsdef', 0x3d, '/^:!\',@+^\x00'}}]}}) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000022c0)={r0}, 0x8) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r9, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r10, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(r8, &(0x7f0000002300)={0x50, 0x0, r10, [{0x4, 0xffff, 0x6, 0x2, 'fowner'}, {0x1, 0x5, 0x1, 0xfffffff9, ','}]}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x0, 0x12}}, 0x20) 21:36:49 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r1, &(0x7f00000000c0)={0x2020}, 0x2020) ioctl$RTC_UIE_ON(r0, 0x7003) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) [ 2996.545892] audit: type=1804 audit(1677793009.571:2518): pid=26634 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2239497309/syzkaller.23IMBb/14386/file0" dev="sda1" ino=14434 res=1 21:36:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r1, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r2, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000002140)={{0x1, 0x1, 0x18, r0, {r3, r4}}, './file0\x00'}) r6 = getuid() r7 = getuid() mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x214010, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[{@blksize}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@seclabel}, {@euid_gt={'euid>', r3}}, {@permit_directio}, {@euid_eq={'euid', 0x3d, r7}}, {@smackfsdef={'smackfsdef', 0x3d, '/^:!\',@+^\x00'}}]}}) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000022c0)={r0}, 0x8) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r9, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r10, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(r8, &(0x7f0000002300)={0x50, 0x0, r10, [{0x4, 0xffff, 0x6, 0x2, 'fowner'}, {0x1, 0x5, 0x1, 0xfffffff9, ','}]}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x0, 0x12}}, 0x20) 21:36:49 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, 0x28) 21:36:49 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0xcb0d7b60c298a31}}, 0x20) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r3, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x7, 0x4, 0x4, 0x4, 'syz1\x00', 0x9}, 0x3, 0x100, 0x3, r3, 0x4, 0x5, 'syz1\x00', &(0x7f0000000040)=['(^0\x9e-($\x00', ')A#\\\x00', '/dev/cachefiles\x00', '/dev/cachefiles\x00'], 0x2d}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) recvmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000280)=""/237, 0xed}, {&(0x7f0000000380)=""/156, 0x9c}], 0x2, &(0x7f0000000180)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}, 0x2120) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x8}}, 0x20) 21:36:49 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2996.650999] audit: type=1804 audit(1677793009.672:2519): pid=26646 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2239497309/syzkaller.23IMBb/14387/file0" dev="sda1" ino=13903 res=1 21:36:49 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000002140)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x8, @loopback, 0xffff}}}, 0x38) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0xcb0d7b60c298a31}}, 0x20) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r3, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x7, 0x4, 0x4, 0x4, 'syz1\x00', 0x9}, 0x3, 0x100, 0x3, r3, 0x4, 0x5, 'syz1\x00', &(0x7f0000000040)=['(^0\x9e-($\x00', ')A#\\\x00', '/dev/cachefiles\x00', '/dev/cachefiles\x00'], 0x2d}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2996.750482] audit: type=1804 audit(1677793009.772:2520): pid=26658 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir2239497309/syzkaller.23IMBb/14388/file0" dev="sda1" ino=14433 res=1 21:36:49 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0xcb0d7b60c298a31}}, 0x20) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r3, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000180)={{0x7, 0x4, 0x4, 0x4, 'syz1\x00', 0x9}, 0x3, 0x100, 0x3, r3, 0x4, 0x5, 'syz1\x00', &(0x7f0000000040)=['(^0\x9e-($\x00', ')A#\\\x00', '/dev/cachefiles\x00', '/dev/cachefiles\x00'], 0x2d}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:49 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:49 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x8, @loopback, 0xffff}}}, 0x38) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) 21:36:49 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2996.878215] audit: type=1804 audit(1677793009.902:2521): pid=26673 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13423/file0" dev="sda1" ino=14384 res=1 21:36:50 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_WIE_ON(r1, 0x700f) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 21:36:50 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) socketpair(0x27, 0x6, 0x101, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r2, &(0x7f0000000140)=@abs, &(0x7f0000000040)=0x6e, 0x40000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 21:36:50 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r0, 0x0, 0x5dc4e9119b77be7c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r3 = getuid() r4 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4]) write$FUSE_ENTRY(r1, &(0x7f0000000180)={0x90, 0x0, 0x0, {0x3, 0x3, 0x1ff, 0x0, 0x0, 0x7, {0x0, 0x9, 0x4, 0x60000, 0xe2b, 0x369c, 0xeb77, 0x4, 0x0, 0x6000, 0x10001, r3, 0xee01, 0x6bd1, 0x2}}}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x806f}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x2}}, './file0\x00'}) 21:36:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r1, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002180)={0x20, 0x0, r1, {0x0, 0x10}}, 0x20) r2 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5, 0xc0}}, './file0\x00'}) read$FUSE(r2, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r2, &(0x7f0000000000)={0x28}, 0x28) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 21:36:50 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000440)={0x1, 0x4, 0x1, 0x0, &(0x7f0000000340)=[{}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:50 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:50 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_getres(0x7, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:50 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r1, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002180)={0x20, 0x0, r1, {0x0, 0x10}}, 0x20) r2 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5, 0xc0}}, './file0\x00'}) read$FUSE(r2, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r2, &(0x7f0000000000)={0x28}, 0x28) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 21:36:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x5) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', 0x0, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r2, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r2, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r3, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r3, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000a00)={'syztnl2\x00', &(0x7f0000000980)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x26, 0xfffffffe, 0xc, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, 0x20, 0x4e4b8575d91e864f, 0x2, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r5, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r5, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000011c0)={&(0x7f0000000a40)={0x76c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8ef}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4d}}, {0x8}}}]}}, {{0x8}, {0x258, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffb}}, {0x8}}}]}}, {{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x20, 0x80, 0x80, 0x9}, {0x3, 0x9, 0x8, 0x101}, {0xd56, 0x2, 0x1f, 0x4}, {0x3, 0x39, 0x5, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}]}}]}, 0x76c}, 0x1, 0x0, 0x0, 0x11}, 0x24000061) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r6, 0x6}}, 0x18) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x514840, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000005c0)=ANY=[@ANYBLOB="010000000100000018000000d36a06ff8649cc9c466e281c6dbdb3717f508fa2ca9e398c65233c915adda19ad558a85bf0e94f01a0a88279a837d7d30464e65740e63bc6aa632169fbd78939773aa66a0e3db4676dfd6f70edf3823c0a671d08000000d5587e9ffa8d62b85fcf2a31c964ec96627dfd822aaf07f5522953d66384a85eb9809ecae00f9ce97e0cd7c421aa9c04d7ff690f68be037f7d7cd2d7b0cf19125d005cc27056988686afc272a22bad826089097f5bfbdce15d9d00"/202, @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB='./file0\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440), 0x111, 0x5}}, 0x20) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r10, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r10, 0xc0505510, &(0x7f00000006c0)={0x8001, 0x3, 0x8, 0x1ff, &(0x7f00000004c0)=[{}, {}, {}]}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x2, r11, 0x30, 0x0, @ib={0x1b, 0x400, 0x61c, {"1a93cbc6c830e3b47f01483c93a0e578"}, 0x1, 0x8, 0xc0}}}, 0xa0) 21:36:50 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000004500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="9dfd6c35ffb7115bcd930814edfc97"]) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc0}}, './file0\x00'}) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r2, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r3, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r4 = openat(0xffffffffffffffff, &(0x7f0000002280)='./file0\x00', 0x408102, 0x1) r5 = getuid() read$FUSE(r2, &(0x7f00000022c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) stat(&(0x7f0000004300)='./file0\x00', &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000021c0), &(0x7f0000002200)='./file0\x00', &(0x7f0000002240), 0x808000, &(0x7f00000043c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize}, {@allow_other}], [{@audit}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/cuse\x00'}}, {@euid_lt={'euid<', r7}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel}]}}) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0x0, r3, {{0x2}}}, 0x28) 21:36:50 executing program 5: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000004500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="9dfd6c35ffb7115bcd930814edfc97"]) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc0}}, './file0\x00'}) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r2, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r3, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) r4 = openat(0xffffffffffffffff, &(0x7f0000002280)='./file0\x00', 0x408102, 0x1) r5 = getuid() read$FUSE(r2, &(0x7f00000022c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) stat(&(0x7f0000004300)='./file0\x00', &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000021c0), &(0x7f0000002200)='./file0\x00', &(0x7f0000002240), 0x808000, &(0x7f00000043c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize}, {@allow_other}], [{@audit}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/cuse\x00'}}, {@euid_lt={'euid<', r7}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel}]}}) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0x0, r3, {{0x2}}}, 0x28) 21:36:50 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:50 executing program 4: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200)={r0, r1+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:50 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:50 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x8fb, 0x1ff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:50 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r1, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002180)={0x20, 0x0, r1, {0x0, 0x10}}, 0x20) r2 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5, 0xc0}}, './file0\x00'}) read$FUSE(r2, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r2, &(0x7f0000000000)={0x28}, 0x28) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 21:36:50 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x3b, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r2, 0x1c, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0xa0) 21:36:50 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:50 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:50 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x321080, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x80000000000002, 0x0, 0x111, 0x8}}, 0x20) 21:36:50 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) clock_gettime(0x0, &(0x7f0000002140)={0x0, 0x0}) utimensat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000002180)={{r4, r5/1000+10000}}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r7 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r6, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r7, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) r8 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r9 = getuid() r10 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r11, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000002500)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r11, &(0x7f0000002580)={0x4, 0x8, 0xfa00, {r12, 0x6}}, 0x10) stat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r15 = getuid() r16 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r14, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r15, @ANYBLOB=',group_id=', @ANYRESDEC=r16]) mount$fuseblk(&(0x7f0000002200), &(0x7f0000002240)='./file0\x00', &(0x7f0000002280), 0x0, &(0x7f0000002380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id', 0x3d, r13}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, '{'}}, {@pcr={'pcr', 0x3d, 0x14}}, {@uid_gt={'uid>', r2}}, {@fsname}, {@dont_measure}, {@fowner_gt={'fowner>', r15}}, {@smackfshat={'smackfshat', 0x3d, 'syz1\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) r17 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r17, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$FUSE_LK(r17, &(0x7f0000000000)={0x28, 0xfffffffffffffffe, r1, {{0xfffffffffffffffb, 0x8000000000000000, 0x1, r7}}}, 0x28) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000021c0)={0x31, 0x5, 0x6, 0x12, 0x7, 0xffff, 0x0, 0x12b}) 21:36:50 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:50 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) syz_open_dev$sndctrl(&(0x7f0000000040), 0xffff, 0x80000) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, r1, {{0x3}}}, 0x28) 21:36:50 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:50 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @multicast1}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xa261) 21:36:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @multicast1}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xa261) [ 2997.934314] audit: type=1804 audit(1677793010.952:2522): pid=26726 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13427/file0" dev="sda1" ino=14360 res=1 21:36:51 executing program 2: open(0x0, 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x80, @local}, r2}}, 0x30) 21:36:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={[{}], [{@dont_appraise}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000004180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="60e25700916530040000001cede38d00"]) linkat(r1, &(0x7f00000041c0)='./file0\x00', r0, &(0x7f0000004400)='./file0\x00', 0x0) unlink(&(0x7f0000004480)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f00000044c0)='./file0\x00', &(0x7f0000004500), &(0x7f0000004540)=ANY=[@ANYBLOB="00fb7ac1003ba08d17c7a0eacf108b35fb93963c5c6c85227446087d960d16f2e72f2ab64f6a2185f5e729f65d3fa35f10e662000000800000000018e21ea6dfde47cf4e3e00d4d0c3e43a5797ab35f1b8b1f600a6228e3ba7f71ccc6e671a7b80cb1bc2de6f2a0000000000ed3236f46101e183c66e9b5b16"], 0x7a, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004440), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) lsetxattr(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)=@known='trusted.overlay.nlink\x00', &(0x7f0000004280)='\x00', 0x1, 0x3) clock_getres(0x2, &(0x7f00000000c0)) getresuid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) write$FUSE_STATFS(r2, &(0x7f0000004380)={0x60, 0x0, r3, {{0x1, 0x3f, 0x7471, 0xfff, 0x9, 0xdd, 0x4, 0x3}}}, 0x60) 21:36:51 executing program 5: prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = getuid() lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000004180)=@v3={0x3000000, [{0x1000, 0x8}, {0x7, 0xa4}], r0}, 0x18, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r1, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r1, &(0x7f0000000000)={0x28}, 0x28) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r2, &(0x7f00000041c0)={0x2020}, 0x204e) [ 2997.981864] audit: type=1804 audit(1677793010.962:2523): pid=26726 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13427/file0" dev="sda1" ino=14360 res=1 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @multicast1}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xa261) 21:36:51 executing program 2: open(0x0, 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @multicast1}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0xa261) 21:36:51 executing program 2: open(0x0, 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x1ff, 0x2}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f0000004280)={0x20, 0xffffffffffffffda, r3, {0x34, 0x4, 0x7fffffff, 0xffffffff}}, 0x20) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0x58, 0x0, r2, [{0x1, 0x7fffffff, 0x9, 0xffff, '\xcb&-#$\x10#($'}, {0x6, 0x6, 0x3, 0x0, ',{*'}]}, 0x58) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000042c0)={r0, r4, 0x4, r5}, 0x10) 21:36:51 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r8 = getuid() r9 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=r9]) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r10, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r11 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r12 = getuid() r13 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB="2c726f2ad2f65d0578d4c3905b6f746d6f64653d303030303030303030303030303030", @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYRESDEC=r13]) write$FUSE_ENTRY(r10, &(0x7f0000000180)={0x90, 0x0, 0x0, {0x3, 0x0, 0x2, 0x8, 0xbd8, 0x10f4, {0x6, 0x7, 0x8, 0x0, 0x7, 0x6, 0x4, 0x8000, 0xfffffffd, 0x2000, 0x1, r12, r3, 0x7, 0x8}}}, 0x90) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@smackfsfloor}, {@fsmagic={'fsmagic', 0x3d, 0xb914}}, {@euid_gt={'euid>', r5}}, {@obj_role}, {@uid_eq={'uid', 0x3d, r8}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0x65, 0x64, 0x34, 0x36, 0x35, 0x66], 0x2d, [0x63, 0x39, 0x35, 0x64], 0x2d, [0x66, 0x61, 0x6a, 0x61], 0x2d, [0x33, 0x38, 0x62, 0x31], 0x2d, [0x63, 0x30, 0x37, 0x34, 0x63, 0x33, 0x36, 0x63]}}}]}}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e24, 0x771f, @private1, 0x5}}}, 0xa0) 21:36:51 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r8 = getuid() r9 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=r9]) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r10, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r11 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r12 = getuid() r13 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB="2c726f2ad2f65d0578d4c3905b6f746d6f64653d303030303030303030303030303030", @ANYRESDEC=r12, @ANYBLOB=',group_id=', @ANYRESDEC=r13]) write$FUSE_ENTRY(r10, &(0x7f0000000180)={0x90, 0x0, 0x0, {0x3, 0x0, 0x2, 0x8, 0xbd8, 0x10f4, {0x6, 0x7, 0x8, 0x0, 0x7, 0x6, 0x4, 0x8000, 0xfffffffd, 0x2000, 0x1, r12, r3, 0x7, 0x8}}}, 0x90) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@smackfsfloor}, {@fsmagic={'fsmagic', 0x3d, 0xb914}}, {@euid_gt={'euid>', r5}}, {@obj_role}, {@uid_eq={'uid', 0x3d, r8}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0x65, 0x64, 0x34, 0x36, 0x35, 0x66], 0x2d, [0x63, 0x39, 0x35, 0x64], 0x2d, [0x66, 0x61, 0x6a, 0x61], 0x2d, [0x33, 0x38, 0x62, 0x31], 0x2d, [0x63, 0x30, 0x37, 0x34, 0x63, 0x33, 0x36, 0x63]}}}]}}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e24, 0x771f, @private1, 0x5}}}, 0xa0) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @multicast1}}}, 0xa0) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r0, r1, 0x4, r2}, 0x10) read$FUSE(r2, &(0x7f0000002580)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0xfffffffffffffffe}}}, 0x28) unlink(&(0x7f0000000040)='./file0/../file0\x00') lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r4, 0x4) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000500)=ANY=[@ANYBLOB="0100050000007638990000000000", @ANYRES32=r0, @ANYBLOB="00040000000000002e2f66696c653000"]) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x5, [@typedef={0x5, 0x0, 0x0, 0x8, 0x4}, @enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x7, 0xff}, {0xb, 0x401}]}, @union={0x8, 0x2, 0x0, 0x5, 0x1, 0x9, [{0x6, 0x3, 0xc0000}, {0x6, 0x5, 0x96}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xe, 0x5}, {0xf, 0x1}, {0x0, 0x3}, {0x2, 0x3}, {0x7, 0x4}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x1, 0x5, [{0x8, 0x4, 0x7}, {0x5, 0x4, 0x5}]}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000380)=""/217, 0xc1, 0xd9}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r6, {0xfffffffe}}, './file0\x00'}) 21:36:51 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) open(&(0x7f0000002f80)='./file0\x00', 0x2040, 0x0) stat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x14080, 0x140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)={0x100, 0x0, r4, [{0x2, 0x9, 0x0, 0xfffffc00}, {0x4, 0x5, 0x6, 0x2, 'team0\x00'}, {0x5, 0x10000, 0x1, 0x10001, '\x00'}, {0x1, 0xce, 0x1, 0x2, '\x00'}, {0x3, 0x9, 0x4, 0x1, '^-)\''}, {0x6, 0x5, 0x0, 0x100}, {0x3, 0x100000000, 0x2, 0x2, '&-'}, {0x0, 0xae, 0x2, 0xbb5, '\xa2$'}]}, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) open(&(0x7f0000002f80)='./file0\x00', 0x2040, 0x0) stat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x14080, 0x140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)={0x100, 0x0, r4, [{0x2, 0x9, 0x0, 0xfffffc00}, {0x4, 0x5, 0x6, 0x2, 'team0\x00'}, {0x5, 0x10000, 0x1, 0x10001, '\x00'}, {0x1, 0xce, 0x1, 0x2, '\x00'}, {0x3, 0x9, 0x4, 0x1, '^-)\''}, {0x6, 0x5, 0x0, 0x100}, {0x3, 0x100000000, 0x2, 0x2, '&-'}, {0x0, 0xae, 0x2, 0xbb5, '\xa2$'}]}, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x8, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r3 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x80, 0x80000) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f0000000680)={{}, {0x8}, 0x104, 0x0, 0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)="13dabe7ce1b179e9f39410bc43d47a872f44968270432594438859187adc8caf5ea680e2c6a113a0f200e5865efdbef0de01fca6949b48d15a0b059cb68b094b43a9cfaf0d5dd1423675fd29f77771ae523e5088f6fb81c5f56239f0f72e588e85a2d032feb44864e99ea3ba19abfa4f6e1a6817c70129ea6deb5b958ea5fb38e7ab0f5d6630258c7d09a204688d0319268a326d90d325ef85693fe1b9fd631381af5a40c3cb5a3a255d27577640897da1c542dcf7daf1d647e8", 0xba, 0x0, &(0x7f00000004c0)={0x2, 0x164, {0x1, 0xc, 0x99, "3499ff5cc0d1f6bc6913a0504940ac7bd5bcf3c82106df5252e7d16ece626f6933dfc5d469b87c8911da3e914c9dd99c05aa4557d57246fcd67c24c912522a550d87878a5724ca27fad878412f6b6e7d726a03433651eab0621cb0794cb296115bc0912ed6d5cbc3311e0015a6bba6d48f06b75d92bc869e16811e939dcda39b980d8c64323405749e8bc76588a4811880f05d4eb6655ded81", 0xbe, "b20026fba539c6a874a5a17beddb95b53dbcab36dcb2eaa7f3c8ca977d17bf32feab2d9010cadaf87349f9bb108f6c15f7349d4ccf468cc5e1e93f1bc7cbae4ae322e7f0a5c64887bd89bb34d37122c7b6e6287aaf9ca916cdd58f22529dd9c4b9607fa4187bb4aaa76b84c4806f371a7d6cbdc1a5aa5b719f7fae18de767d3541e8053f98c892b5437f8025c23088685907ea99cc0f72d10483cd348dc6c0cd8cdcb95c83c79ed873ca0daf2ac6f08cfa3502bd7353bb9dbc5724b2823a"}, 0x4a, "d74c8a1952b7505c0231d4517e0c1c6c9948fe14a98436ec52e47d87cf5527505837c1feb28e6f5e050b185b1bccfc64a4f62c4264d72844ac2ba6a9b3f9ce1ce1d40db85cd7fcd10ec8"}, 0x1ba}) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="070000006a0400000000eefc505046dee456d502b5f4da000000007111", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYBLOB="030000a001000000010000801b01000067ca73a9d3aa284f9bf36729f0821026d79f23ed47e7ba1322a098bcfeec4dbdf850b75e1fe2de358187981c365da53ff13fae647b113daef34d4a6dbfa92b99"], 0x80}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat(r5, &(0x7f0000000740)='./file0\x00', 0x101a00, 0x109) acct(&(0x7f0000000040)='./file0\x00') 21:36:51 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r3 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x80, 0x80000) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f0000000680)={{}, {0x8}, 0x104, 0x0, 0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)="13dabe7ce1b179e9f39410bc43d47a872f44968270432594438859187adc8caf5ea680e2c6a113a0f200e5865efdbef0de01fca6949b48d15a0b059cb68b094b43a9cfaf0d5dd1423675fd29f77771ae523e5088f6fb81c5f56239f0f72e588e85a2d032feb44864e99ea3ba19abfa4f6e1a6817c70129ea6deb5b958ea5fb38e7ab0f5d6630258c7d09a204688d0319268a326d90d325ef85693fe1b9fd631381af5a40c3cb5a3a255d27577640897da1c542dcf7daf1d647e8", 0xba, 0x0, &(0x7f00000004c0)={0x2, 0x164, {0x1, 0xc, 0x99, "3499ff5cc0d1f6bc6913a0504940ac7bd5bcf3c82106df5252e7d16ece626f6933dfc5d469b87c8911da3e914c9dd99c05aa4557d57246fcd67c24c912522a550d87878a5724ca27fad878412f6b6e7d726a03433651eab0621cb0794cb296115bc0912ed6d5cbc3311e0015a6bba6d48f06b75d92bc869e16811e939dcda39b980d8c64323405749e8bc76588a4811880f05d4eb6655ded81", 0xbe, "b20026fba539c6a874a5a17beddb95b53dbcab36dcb2eaa7f3c8ca977d17bf32feab2d9010cadaf87349f9bb108f6c15f7349d4ccf468cc5e1e93f1bc7cbae4ae322e7f0a5c64887bd89bb34d37122c7b6e6287aaf9ca916cdd58f22529dd9c4b9607fa4187bb4aaa76b84c4806f371a7d6cbdc1a5aa5b719f7fae18de767d3541e8053f98c892b5437f8025c23088685907ea99cc0f72d10483cd348dc6c0cd8cdcb95c83c79ed873ca0daf2ac6f08cfa3502bd7353bb9dbc5724b2823a"}, 0x4a, "d74c8a1952b7505c0231d4517e0c1c6c9948fe14a98436ec52e47d87cf5527505837c1feb28e6f5e050b185b1bccfc64a4f62c4264d72844ac2ba6a9b3f9ce1ce1d40db85cd7fcd10ec8"}, 0x1ba}) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="070000006a0400000000eefc505046dee456d502b5f4da000000007111", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYBLOB="030000a001000000010000801b01000067ca73a9d3aa284f9bf36729f0821026d79f23ed47e7ba1322a098bcfeec4dbdf850b75e1fe2de358187981c365da53ff13fae647b113daef34d4a6dbfa92b99"], 0x80}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat(r5, &(0x7f0000000740)='./file0\x00', 0x101a00, 0x109) acct(&(0x7f0000000040)='./file0\x00') 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(0x0, 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x0, 0x0, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r4 = getuid() r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r1, r2}}, './file0\x00'}) write$FUSE_ENTRY(r0, &(0x7f0000002140)={0x90, 0x0, 0x0, {0x3, 0x0, 0x3, 0x9, 0x674a6483, 0x1886, {0x4, 0x7d, 0x1, 0x7fff, 0xb85b, 0x6, 0x821d, 0xff, 0x2, 0x1000, 0x1, r4, r6, 0xff, 0x8}}}, 0x90) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:51 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r3 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@l2tp={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x80, 0x80000) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f0000000680)={{}, {0x8}, 0x104, 0x0, 0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)="13dabe7ce1b179e9f39410bc43d47a872f44968270432594438859187adc8caf5ea680e2c6a113a0f200e5865efdbef0de01fca6949b48d15a0b059cb68b094b43a9cfaf0d5dd1423675fd29f77771ae523e5088f6fb81c5f56239f0f72e588e85a2d032feb44864e99ea3ba19abfa4f6e1a6817c70129ea6deb5b958ea5fb38e7ab0f5d6630258c7d09a204688d0319268a326d90d325ef85693fe1b9fd631381af5a40c3cb5a3a255d27577640897da1c542dcf7daf1d647e8", 0xba, 0x0, &(0x7f00000004c0)={0x2, 0x164, {0x1, 0xc, 0x99, "3499ff5cc0d1f6bc6913a0504940ac7bd5bcf3c82106df5252e7d16ece626f6933dfc5d469b87c8911da3e914c9dd99c05aa4557d57246fcd67c24c912522a550d87878a5724ca27fad878412f6b6e7d726a03433651eab0621cb0794cb296115bc0912ed6d5cbc3311e0015a6bba6d48f06b75d92bc869e16811e939dcda39b980d8c64323405749e8bc76588a4811880f05d4eb6655ded81", 0xbe, "b20026fba539c6a874a5a17beddb95b53dbcab36dcb2eaa7f3c8ca977d17bf32feab2d9010cadaf87349f9bb108f6c15f7349d4ccf468cc5e1e93f1bc7cbae4ae322e7f0a5c64887bd89bb34d37122c7b6e6287aaf9ca916cdd58f22529dd9c4b9607fa4187bb4aaa76b84c4806f371a7d6cbdc1a5aa5b719f7fae18de767d3541e8053f98c892b5437f8025c23088685907ea99cc0f72d10483cd348dc6c0cd8cdcb95c83c79ed873ca0daf2ac6f08cfa3502bd7353bb9dbc5724b2823a"}, 0x4a, "d74c8a1952b7505c0231d4517e0c1c6c9948fe14a98436ec52e47d87cf5527505837c1feb28e6f5e050b185b1bccfc64a4f62c4264d72844ac2ba6a9b3f9ce1ce1d40db85cd7fcd10ec8"}, 0x1ba}) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="070000006a0400000000eefc505046dee456d502b5f4da000000007111", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYBLOB="030000a001000000010000801b01000067ca73a9d3aa284f9bf36729f0821026d79f23ed47e7ba1322a098bcfeec4dbdf850b75e1fe2de358187981c365da53ff13fae647b113daef34d4a6dbfa92b99"], 0x80}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000700)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat(r5, &(0x7f0000000740)='./file0\x00', 0x101a00, 0x109) acct(&(0x7f0000000040)='./file0\x00') 21:36:51 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:51 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlink(&(0x7f0000000040)='./file0\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(0x0, 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x0, 0x0, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(0x0, 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) unlink(&(0x7f0000000040)='./file0\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:51 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:51 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x0, @broadcast}}}, 0xa0) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(0x0, 0x141400, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x0, 0x0, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002e40)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8}, 0x10) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)={0x2b, 0x6, 0x0, {0x3, 0x6, 0x2, 0x0, '(\''}}, 0x2b) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:36:51 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 1) 21:36:51 executing program 0: read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x9, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (fail_nth: 1) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x9, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2998.696924] FAULT_INJECTION: forcing a failure. [ 2998.696924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2998.712345] CPU: 0 PID: 26824 Comm: syz-executor.5 Not tainted 4.14.307-syzkaller #0 [ 2998.720606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 2998.730006] Call Trace: [ 2998.732604] dump_stack+0x1b2/0x281 [ 2998.736249] should_fail.cold+0x10a/0x149 [ 2998.740433] __alloc_pages_nodemask+0x21e/0x2900 21:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) 21:36:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) connect$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 2998.745222] ? trace_hardirqs_on+0x10/0x10 [ 2998.749474] ? __getblk_gfp+0x48/0x70 [ 2998.753313] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2998.758177] ? __radix_tree_lookup+0x1b5/0x2e0 [ 2998.762841] ? lock_downgrade+0x740/0x740 [ 2998.767035] alloc_pages_current+0x155/0x260 [ 2998.771461] pagecache_get_page+0x3f5/0xab0 [ 2998.775810] grab_cache_page_write_begin+0x63/0x90 [ 2998.780769] ext4_da_write_begin+0x249/0xe70 [ 2998.785203] ? ext4_write_begin+0x12f0/0x12f0 [ 2998.789740] generic_perform_write+0x1d5/0x430 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) connect$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 2998.794347] ? __mnt_drop_write_file+0x5f/0x90 [ 2998.798941] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 2998.803625] ? current_time+0xb0/0xb0 [ 2998.807435] ? ext4_file_write_iter+0x1cc/0xd20 [ 2998.812119] __generic_file_write_iter+0x227/0x590 [ 2998.817152] ext4_file_write_iter+0x276/0xd20 [ 2998.821664] ? aa_file_perm+0x304/0xab0 [ 2998.825751] ? ext4_file_read_iter+0x330/0x330 [ 2998.830370] ? trace_hardirqs_on+0x10/0x10 [ 2998.834631] ? iov_iter_init+0xa6/0x1c0 [ 2998.838665] __vfs_write+0x44c/0x630 [ 2998.842395] ? kernel_read+0x110/0x110 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2998.846397] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2998.851428] vfs_write+0x17f/0x4d0 [ 2998.854986] SyS_write+0xf2/0x210 [ 2998.858456] ? SyS_read+0x210/0x210 [ 2998.862098] ? __do_page_fault+0x159/0xad0 [ 2998.866433] ? do_syscall_64+0x4c/0x640 [ 2998.870414] ? SyS_read+0x210/0x210 [ 2998.874056] do_syscall_64+0x1d5/0x640 [ 2998.877965] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2998.883162] RIP: 0033:0x7fdaff1360f9 [ 2998.886876] RSP: 002b:00007fdafd6a8168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 21:36:51 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 1) 21:36:51 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 2) 21:36:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) (async) connect$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:51 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) [ 2998.894592] RAX: ffffffffffffffda RBX: 00007fdaff255f80 RCX: 00007fdaff1360f9 [ 2998.901867] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 2998.909131] RBP: 00007fdafd6a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 2998.916399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2998.923782] R13: 00007ffc9bcf75af R14: 00007fdafd6a8300 R15: 0000000000022000 21:36:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2998.994741] FAULT_INJECTION: forcing a failure. [ 2998.994741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2999.023246] CPU: 0 PID: 26850 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 2999.032050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 2999.041415] Call Trace: 21:36:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x100000, 0x0) read$FUSE(r0, 0x0, 0x33) [ 2999.044023] dump_stack+0x1b2/0x281 [ 2999.047678] should_fail.cold+0x10a/0x149 [ 2999.051848] __alloc_pages_nodemask+0x21e/0x2900 [ 2999.056631] ? trace_hardirqs_on+0x10/0x10 [ 2999.060918] ? __getblk_gfp+0x48/0x70 [ 2999.064749] ? __ext4_get_inode_loc+0x473/0x1110 [ 2999.069522] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2999.074379] ? xattr_find_entry+0x252/0x350 [ 2999.078712] ? __radix_tree_lookup+0x1b5/0x2e0 [ 2999.083321] ? lock_downgrade+0x740/0x740 [ 2999.087490] alloc_pages_current+0x155/0x260 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x7, 0x100000000, 0x3, 0x1, 0x3, 0x0, 0x1000, 0x3}, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:52 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x1}}}, 0x28) [ 2999.091920] pagecache_get_page+0x3f5/0xab0 [ 2999.096291] grab_cache_page_write_begin+0x63/0x90 [ 2999.101256] ext4_da_write_begin+0x249/0xe70 [ 2999.105683] ? current_time+0x16/0xb0 [ 2999.109522] ? ext4_write_begin+0x12f0/0x12f0 [ 2999.114130] generic_perform_write+0x1d5/0x430 [ 2999.118742] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 2999.123454] ? current_time+0xb0/0xb0 [ 2999.127271] ? ext4_file_write_iter+0x1cc/0xd20 [ 2999.132125] __generic_file_write_iter+0x227/0x590 [ 2999.137082] ext4_file_write_iter+0x276/0xd20 [ 2999.141586] ? aa_file_perm+0x304/0xab0 21:36:52 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x1}}}, 0x28) 21:36:52 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x1}}}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x1}}}, 0x28) (async) [ 2999.145572] ? ext4_file_read_iter+0x330/0x330 [ 2999.150218] ? trace_hardirqs_on+0x10/0x10 [ 2999.154469] ? iov_iter_init+0xa6/0x1c0 [ 2999.158459] __vfs_write+0x44c/0x630 [ 2999.162195] ? kernel_read+0x110/0x110 [ 2999.166112] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2999.171145] vfs_write+0x17f/0x4d0 [ 2999.174702] SyS_write+0xf2/0x210 [ 2999.178174] ? SyS_read+0x210/0x210 [ 2999.181814] ? __do_page_fault+0x159/0xad0 [ 2999.186059] ? do_syscall_64+0x4c/0x640 [ 2999.190044] ? SyS_read+0x210/0x210 [ 2999.193685] do_syscall_64+0x1d5/0x640 [ 2999.197667] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2999.202856] RIP: 0033:0x7f043d3b60f9 [ 2999.206581] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2999.214296] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 2999.221572] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 2999.228840] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 2999.236114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2999.243392] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:52 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 2) 21:36:52 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) 21:36:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x33) 21:36:52 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000001200)=""/4096) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) accept4$unix(r1, &(0x7f0000001140), &(0x7f00000011c0)=0x6e, 0x800) prctl$PR_SET_KEEPCAPS(0x8, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:52 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:52 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:52 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:52 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) (async) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) (async) getitimer(0x1, &(0x7f0000000180)) (async) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2999.363160] FAULT_INJECTION: forcing a failure. [ 2999.363160] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.387973] CPU: 0 PID: 26888 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 2999.395886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 2999.405260] Call Trace: [ 2999.407876] dump_stack+0x1b2/0x281 21:36:52 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2999.411527] should_fail.cold+0x10a/0x149 [ 2999.415694] should_failslab+0xd6/0x130 [ 2999.419692] kmem_cache_alloc+0x28e/0x3c0 [ 2999.423856] alloc_buffer_head+0x20/0x110 [ 2999.428015] alloc_page_buffers+0xb3/0x1f0 [ 2999.432267] create_empty_buffers+0x2c/0x470 [ 2999.436697] create_page_buffers+0x14d/0x1c0 [ 2999.441127] __block_write_begin_int+0x176/0x11d0 [ 2999.445983] ? __lru_cache_add+0x178/0x250 [ 2999.450235] ? other_inode_match+0x7d0/0x7d0 [ 2999.454656] ? add_to_page_cache_lru+0x136/0x2b0 [ 2999.459436] ? __breadahead_gfp+0x150/0x150 [ 2999.463793] ext4_da_write_begin+0x402/0xe70 [ 2999.468226] ? ext4_write_begin+0x12f0/0x12f0 [ 2999.472752] generic_perform_write+0x1d5/0x430 [ 2999.477363] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 2999.482058] ? current_time+0xb0/0xb0 [ 2999.485881] ? ext4_file_write_iter+0x1cc/0xd20 [ 2999.490776] __generic_file_write_iter+0x227/0x590 [ 2999.495732] ext4_file_write_iter+0x276/0xd20 [ 2999.500321] ? aa_file_perm+0x304/0xab0 [ 2999.504304] ? ext4_file_read_iter+0x330/0x330 [ 2999.508915] ? trace_hardirqs_on+0x10/0x10 [ 2999.513159] ? iov_iter_init+0xa6/0x1c0 [ 2999.517150] __vfs_write+0x44c/0x630 [ 2999.520975] ? kernel_read+0x110/0x110 [ 2999.524896] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2999.530036] vfs_write+0x17f/0x4d0 [ 2999.533601] SyS_write+0xf2/0x210 [ 2999.537067] ? SyS_read+0x210/0x210 [ 2999.540710] ? __do_page_fault+0x159/0xad0 [ 2999.544962] ? do_syscall_64+0x4c/0x640 [ 2999.549066] ? SyS_read+0x210/0x210 [ 2999.552700] do_syscall_64+0x1d5/0x640 [ 2999.556605] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 21:36:52 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 3) 21:36:52 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x33) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:52 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000001200)=""/4096) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) accept4$unix(r1, &(0x7f0000001140), &(0x7f00000011c0)=0x6e, 0x800) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:52 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:52 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) [ 2999.561806] RIP: 0033:0x7f043d3b60f9 [ 2999.565503] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2999.573221] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 2999.580518] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 2999.587827] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 2999.595129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2999.602411] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:52 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 21:36:52 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) 21:36:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:52 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000001200)=""/4096) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) accept4$unix(r1, &(0x7f0000001140), &(0x7f00000011c0)=0x6e, 0x800) prctl$PR_SET_KEEPCAPS(0x8, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000001200)=""/4096) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) (async) accept4$unix(r1, &(0x7f0000001140), &(0x7f00000011c0)=0x6e, 0x800) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) [ 2999.691047] FAULT_INJECTION: forcing a failure. [ 2999.691047] name failslab, interval 1, probability 0, space 0, times 0 [ 2999.705054] CPU: 0 PID: 26925 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 2999.712967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 2999.722353] Call Trace: [ 2999.724959] dump_stack+0x1b2/0x281 [ 2999.728611] should_fail.cold+0x10a/0x149 [ 2999.732784] should_failslab+0xd6/0x130 [ 2999.736786] __kmalloc+0x2c1/0x400 21:36:52 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) 21:36:52 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) [ 2999.740339] ? ext4_find_extent+0x879/0xbc0 [ 2999.744683] ext4_find_extent+0x879/0xbc0 [ 2999.748854] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2999.754323] ext4_ext_map_blocks+0x19a/0x6b10 [ 2999.758852] ? __lock_acquire+0x5fc/0x3f20 [ 2999.763117] ? __lock_acquire+0x5fc/0x3f20 [ 2999.767394] ? static_obj+0x50/0x50 [ 2999.771043] ? ext4_da_write_begin+0x402/0xe70 [ 2999.775639] ? generic_perform_write+0x1d5/0x430 [ 2999.780413] ? trace_hardirqs_on+0x10/0x10 [ 2999.784672] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2999.789884] ? trace_hardirqs_on+0x10/0x10 [ 2999.794141] ? trace_hardirqs_on+0x10/0x10 [ 2999.798394] ? ext4_es_lookup_extent+0x321/0xac0 [ 2999.803175] ? lock_acquire+0x170/0x3f0 [ 2999.807171] ? lock_acquire+0x170/0x3f0 [ 2999.811157] ? ext4_da_get_block_prep+0x426/0xfc0 [ 2999.816021] ext4_da_get_block_prep+0x8ee/0xfc0 [ 2999.820724] ? lock_acquire+0x170/0x3f0 [ 2999.824713] ? create_page_buffers+0x14d/0x1c0 [ 2999.829307] ? other_inode_match+0x7d0/0x7d0 [ 2999.833735] ? lock_downgrade+0x740/0x740 [ 2999.837900] ? create_empty_buffers+0x282/0x470 [ 2999.842585] ? _raw_spin_unlock+0x29/0x40 [ 2999.846748] ? create_page_buffers+0xce/0x1c0 [ 2999.851346] __block_write_begin_int+0x35c/0x11d0 [ 2999.856204] ? other_inode_match+0x7d0/0x7d0 [ 2999.860643] ? __breadahead_gfp+0x150/0x150 [ 2999.864985] ext4_da_write_begin+0x402/0xe70 [ 2999.869409] ? ext4_write_begin+0x12f0/0x12f0 [ 2999.873910] generic_perform_write+0x1d5/0x430 [ 2999.878552] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 2999.883216] ? current_time+0xb0/0xb0 [ 2999.887016] ? ext4_file_write_iter+0x1cc/0xd20 [ 2999.891679] __generic_file_write_iter+0x227/0x590 [ 2999.896626] ext4_file_write_iter+0x276/0xd20 [ 2999.901112] ? aa_file_perm+0x304/0xab0 [ 2999.905086] ? ext4_file_read_iter+0x330/0x330 [ 2999.909678] ? trace_hardirqs_on+0x10/0x10 [ 2999.913947] ? iov_iter_init+0xa6/0x1c0 [ 2999.917918] __vfs_write+0x44c/0x630 [ 2999.921622] ? kernel_read+0x110/0x110 [ 2999.925515] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2999.930533] vfs_write+0x17f/0x4d0 [ 2999.934085] SyS_write+0xf2/0x210 [ 2999.937530] ? SyS_read+0x210/0x210 [ 2999.941145] ? __do_page_fault+0x159/0xad0 [ 2999.945368] ? do_syscall_64+0x4c/0x640 [ 2999.949344] ? SyS_read+0x210/0x210 [ 2999.952974] do_syscall_64+0x1d5/0x640 [ 2999.956855] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2999.962048] RIP: 0033:0x7f043d3b60f9 [ 2999.965744] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2999.973529] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 2999.980791] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 21:36:53 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 4) 21:36:53 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async, rerun: 64) r1 = getuid() (async, rerun: 64) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) (async) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) 21:36:53 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(r0, 0x0, 0x0) 21:36:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:53 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) 21:36:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 2999.988058] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 2999.995325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3000.002587] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:53 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) 21:36:53 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(r0, 0x0, 0x0) 21:36:53 executing program 5: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() (async) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) (async) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) [ 3000.109752] FAULT_INJECTION: forcing a failure. [ 3000.109752] name failslab, interval 1, probability 0, space 0, times 0 [ 3000.121066] CPU: 0 PID: 26965 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3000.129045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3000.138411] Call Trace: [ 3000.141015] dump_stack+0x1b2/0x281 [ 3000.144688] should_fail.cold+0x10a/0x149 [ 3000.148854] should_failslab+0xd6/0x130 [ 3000.152847] kmem_cache_alloc+0x40/0x3c0 [ 3000.157048] __es_insert_extent+0x338/0x1360 [ 3000.161478] ? __es_shrink+0x8c0/0x8c0 [ 3000.165380] ? lock_acquire+0x170/0x3f0 [ 3000.169370] ? ext4_es_insert_extent+0x11f/0x530 [ 3000.174146] ext4_es_insert_extent+0x1b9/0x530 [ 3000.178754] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 3000.184571] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3000.190052] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 3000.195880] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 3000.200482] ? __lock_acquire+0x5fc/0x3f20 [ 3000.204741] ? __lock_acquire+0x5fc/0x3f20 [ 3000.209000] ? __block_write_begin_int+0x176/0x11d0 [ 3000.214063] ? ext4_da_write_begin+0x402/0xe70 [ 3000.218938] ? generic_perform_write+0x1d5/0x430 [ 3000.223708] ? trace_hardirqs_on+0x10/0x10 [ 3000.227964] ? ext4_find_delalloc_cluster+0x180/0x180 [ 3000.233168] ? trace_hardirqs_on+0x10/0x10 [ 3000.237430] ? trace_hardirqs_on+0x10/0x10 [ 3000.241715] ? ext4_es_lookup_extent+0x321/0xac0 [ 3000.246494] ? lock_acquire+0x170/0x3f0 [ 3000.250501] ? lock_acquire+0x170/0x3f0 [ 3000.254523] ? ext4_da_get_block_prep+0x426/0xfc0 21:36:53 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) getitimer(0x1, &(0x7f0000000180)) 21:36:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:53 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(r0, 0x0, 0x0) [ 3000.259481] ext4_da_get_block_prep+0x8ee/0xfc0 [ 3000.264169] ? lock_acquire+0x170/0x3f0 [ 3000.268167] ? create_page_buffers+0x14d/0x1c0 [ 3000.272770] ? other_inode_match+0x7d0/0x7d0 [ 3000.277209] ? lock_downgrade+0x740/0x740 [ 3000.281373] ? create_empty_buffers+0x282/0x470 [ 3000.286069] ? _raw_spin_unlock+0x29/0x40 [ 3000.290247] ? create_page_buffers+0xce/0x1c0 [ 3000.294763] __block_write_begin_int+0x35c/0x11d0 [ 3000.299623] ? other_inode_match+0x7d0/0x7d0 [ 3000.304062] ? __breadahead_gfp+0x150/0x150 [ 3000.308409] ext4_da_write_begin+0x402/0xe70 [ 3000.312856] ? ext4_write_begin+0x12f0/0x12f0 [ 3000.317373] generic_perform_write+0x1d5/0x430 [ 3000.322004] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 3000.326865] ? current_time+0xb0/0xb0 [ 3000.330668] ? ext4_file_write_iter+0x1cc/0xd20 [ 3000.335338] __generic_file_write_iter+0x227/0x590 [ 3000.340348] ext4_file_write_iter+0x276/0xd20 [ 3000.344851] ? aa_file_perm+0x304/0xab0 [ 3000.348818] ? ext4_file_read_iter+0x330/0x330 [ 3000.353407] ? trace_hardirqs_on+0x10/0x10 [ 3000.357700] ? iov_iter_init+0xa6/0x1c0 [ 3000.361677] __vfs_write+0x44c/0x630 [ 3000.365414] ? kernel_read+0x110/0x110 [ 3000.369311] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3000.374325] vfs_write+0x17f/0x4d0 [ 3000.377865] SyS_write+0xf2/0x210 [ 3000.381425] ? SyS_read+0x210/0x210 [ 3000.385142] ? __do_page_fault+0x159/0xad0 [ 3000.389368] ? do_syscall_64+0x4c/0x640 [ 3000.393332] ? SyS_read+0x210/0x210 [ 3000.396951] do_syscall_64+0x1d5/0x640 [ 3000.400838] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3000.406032] RIP: 0033:0x7f043d3b60f9 21:36:53 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 5) 21:36:53 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') 21:36:53 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) getitimer(0x1, &(0x7f0000000180)) 21:36:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async, rerun: 32) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:53 executing program 2: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141400, 0x0) read$FUSE(r0, 0x0, 0x0) 21:36:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x5f4c, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 3000.409894] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3000.417604] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3000.424864] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3000.432130] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3000.439389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3000.446649] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) getitimer(0x1, &(0x7f0000000180)) 21:36:53 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') [ 3000.539099] FAULT_INJECTION: forcing a failure. [ 3000.539099] name failslab, interval 1, probability 0, space 0, times 0 [ 3000.550428] CPU: 0 PID: 26991 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3000.558327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3000.567689] Call Trace: [ 3000.570297] dump_stack+0x1b2/0x281 [ 3000.573942] should_fail.cold+0x10a/0x149 [ 3000.578109] should_failslab+0xd6/0x130 [ 3000.582086] kmem_cache_alloc+0x40/0x3c0 [ 3000.586148] __es_insert_extent+0x338/0x1360 [ 3000.590562] ext4_es_insert_extent+0x1b9/0x530 [ 3000.595141] ? ext4_da_get_block_prep+0x6e5/0xfc0 [ 3000.599977] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 3000.605787] ? lock_downgrade+0x740/0x740 [ 3000.609939] ext4_da_get_block_prep+0x707/0xfc0 [ 3000.614608] ? other_inode_match+0x7d0/0x7d0 [ 3000.619012] ? lock_downgrade+0x740/0x740 [ 3000.623157] ? create_empty_buffers+0x282/0x470 [ 3000.627820] ? _raw_spin_unlock+0x29/0x40 [ 3000.631958] ? create_page_buffers+0xce/0x1c0 [ 3000.636461] __block_write_begin_int+0x35c/0x11d0 [ 3000.641318] ? other_inode_match+0x7d0/0x7d0 [ 3000.645826] ? __breadahead_gfp+0x150/0x150 [ 3000.650168] ext4_da_write_begin+0x402/0xe70 [ 3000.654575] ? ext4_write_begin+0x12f0/0x12f0 [ 3000.659069] generic_perform_write+0x1d5/0x430 [ 3000.663649] ? __mnt_drop_write_file+0x5f/0x90 [ 3000.668233] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 3000.672906] ? current_time+0xb0/0xb0 [ 3000.676738] ? ext4_file_write_iter+0x1cc/0xd20 [ 3000.681413] __generic_file_write_iter+0x227/0x590 [ 3000.686354] ext4_file_write_iter+0x276/0xd20 [ 3000.690854] ? aa_file_perm+0x304/0xab0 [ 3000.694834] ? ext4_file_read_iter+0x330/0x330 [ 3000.699432] ? trace_hardirqs_on+0x10/0x10 [ 3000.703673] ? iov_iter_init+0xa6/0x1c0 [ 3000.707646] __vfs_write+0x44c/0x630 [ 3000.711369] ? kernel_read+0x110/0x110 [ 3000.715263] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3000.720284] vfs_write+0x17f/0x4d0 [ 3000.723826] SyS_write+0xf2/0x210 [ 3000.727272] ? SyS_read+0x210/0x210 [ 3000.730890] ? __do_page_fault+0x159/0xad0 [ 3000.735120] ? do_syscall_64+0x4c/0x640 [ 3000.739085] ? SyS_read+0x210/0x210 [ 3000.742706] do_syscall_64+0x1d5/0x640 [ 3000.746604] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3000.751874] RIP: 0033:0x7f043d3b60f9 [ 3000.755594] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3000.763308] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3000.770581] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3000.777851] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 21:36:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x3, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:53 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') 21:36:53 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 6) 21:36:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) getitimer(0x1, &(0x7f0000000180)) [ 3000.785116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3000.792375] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:53 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000080)=""/18, 0x12) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) getitimer(0x1, &(0x7f0000000180)) 21:36:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:54 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000080)=""/18, 0x12) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) [ 3001.039630] FAULT_INJECTION: forcing a failure. [ 3001.039630] name failslab, interval 1, probability 0, space 0, times 0 [ 3001.054076] CPU: 0 PID: 27039 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3001.061991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3001.071359] Call Trace: [ 3001.073965] dump_stack+0x1b2/0x281 [ 3001.077604] should_fail.cold+0x10a/0x149 [ 3001.081800] should_failslab+0xd6/0x130 [ 3001.085795] kmem_cache_alloc+0x28e/0x3c0 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) [ 3001.089958] ext4_init_io_end+0x23/0x100 [ 3001.094032] ext4_writepages+0xf5d/0x32a0 [ 3001.098196] ? crypto_shash_update+0xba/0x110 [ 3001.102715] ? ext4_inode_csum+0x582/0x850 [ 3001.106964] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3001.112506] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3001.117531] ? mark_buffer_dirty+0x95/0x480 [ 3001.121885] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3001.126660] ? __lock_acquire+0x5fc/0x3f20 [ 3001.130928] ? ext4_mark_inode_dirty+0x1db/0x7a0 [ 3001.135779] ? trace_hardirqs_on+0x10/0x10 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$FUSE_STATFS(r3, &(0x7f0000000440)={0x60, 0x0, 0x0, {{0xa3, 0xfffffffffffffffe, 0x2, 0x6c47, 0x6aa3, 0x7, 0x8001, 0xa51}}}, 0x60) [ 3001.140034] ? ext4_expand_extra_isize+0x460/0x460 [ 3001.144986] ? __mark_inode_dirty+0x33b/0xf40 [ 3001.149506] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3001.154271] do_writepages+0xc3/0x240 [ 3001.158082] ? page_writeback_cpu_online+0x10/0x10 [ 3001.163021] ? lock_acquire+0x170/0x3f0 [ 3001.167002] ? do_raw_spin_unlock+0x164/0x220 [ 3001.171508] ? _raw_spin_unlock+0x29/0x40 [ 3001.175670] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3001.180968] __filemap_fdatawrite_range+0x236/0x310 [ 3001.187146] ? replace_page_cache_page+0x700/0x700 [ 3001.192100] file_write_and_wait_range+0x86/0xd0 [ 3001.196870] __generic_file_fsync+0x70/0x190 [ 3001.201312] ext4_sync_file+0x8ed/0x12c0 [ 3001.205396] ? ext4_getfsmap+0x8c0/0x8c0 [ 3001.209478] vfs_fsync_range+0x103/0x260 [ 3001.213602] ext4_file_write_iter+0x5fa/0xd20 [ 3001.218246] ? aa_file_perm+0x304/0xab0 [ 3001.222222] ? ext4_file_read_iter+0x330/0x330 [ 3001.226818] ? trace_hardirqs_on+0x10/0x10 [ 3001.231062] ? iov_iter_init+0xa6/0x1c0 [ 3001.235148] __vfs_write+0x44c/0x630 [ 3001.238965] ? kernel_read+0x110/0x110 [ 3001.242882] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3001.247913] vfs_write+0x17f/0x4d0 [ 3001.251461] SyS_write+0xf2/0x210 [ 3001.254914] ? SyS_read+0x210/0x210 [ 3001.258549] ? __do_page_fault+0x159/0xad0 [ 3001.262812] ? do_syscall_64+0x4c/0x640 [ 3001.266796] ? SyS_read+0x210/0x210 [ 3001.270424] do_syscall_64+0x1d5/0x640 [ 3001.274345] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3001.279529] RIP: 0033:0x7f043d3b60f9 [ 3001.283233] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 21:36:54 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) (async) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') (async) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) 21:36:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0xffff, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 3001.291040] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3001.298316] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3001.305575] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3001.312855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3001.320122] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:54 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000080)=""/18, 0x12) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:54 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 7) 21:36:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) getitimer(0x1, &(0x7f0000000180)) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28}, 0x28) 21:36:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:54 executing program 0: getitimer(0x1, &(0x7f0000000180)) 21:36:54 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x1, 0x2, 0x401, 'syz1\x00', 0x7f}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3001.443623] FAULT_INJECTION: forcing a failure. [ 3001.443623] name failslab, interval 1, probability 0, space 0, times 0 [ 3001.467578] CPU: 0 PID: 27082 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3001.475500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3001.484899] Call Trace: [ 3001.487529] dump_stack+0x1b2/0x281 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r1}}]}}) 21:36:54 executing program 5: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x171f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x121000, 0xae) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000140)='\x00', 0x100, 0x101) r2 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x14008, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x75b2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user}, {@obj_type={'obj_type', 0x3d, '+#:'}}, {@measure}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}]}}) 21:36:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e4, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) [ 3001.491219] should_fail.cold+0x10a/0x149 [ 3001.495388] should_failslab+0xd6/0x130 [ 3001.499383] kmem_cache_alloc+0x28e/0x3c0 [ 3001.503554] ext4_init_io_end+0x23/0x100 [ 3001.507630] ext4_writepages+0x1008/0x32a0 [ 3001.511881] ? crypto_shash_update+0xba/0x110 [ 3001.516392] ? ext4_inode_csum+0x582/0x850 [ 3001.520650] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3001.525684] ? mark_buffer_dirty+0x95/0x480 [ 3001.530031] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3001.534811] ? __lock_acquire+0x5fc/0x3f20 [ 3001.539083] ? ext4_mark_inode_dirty+0x1db/0x7a0 21:36:54 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x1, 0x2, 0x401, 'syz1\x00', 0x7f}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x4) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x1, 0x2, 0x401, 'syz1\x00', 0x7f}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) getgid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) [ 3001.543857] ? trace_hardirqs_on+0x10/0x10 [ 3001.548108] ? ext4_expand_extra_isize+0x460/0x460 [ 3001.553054] ? __mark_inode_dirty+0x33b/0xf40 [ 3001.557567] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3001.562334] do_writepages+0xc3/0x240 [ 3001.566162] ? page_writeback_cpu_online+0x10/0x10 [ 3001.567641] kauditd_printk_skb: 15 callbacks suppressed 21:36:54 executing program 5: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x171f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x121000, 0xae) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000140)='\x00', 0x100, 0x101) r2 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x14008, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x75b2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user}, {@obj_type={'obj_type', 0x3d, '+#:'}}, {@measure}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}]}}) (async) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x14008, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x75b2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user}, {@obj_type={'obj_type', 0x3d, '+#:'}}, {@measure}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}]}}) [ 3001.567653] audit: type=1804 audit(1677793014.492:2539): pid=27090 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13948/file0" dev="sda1" ino=14482 res=1 [ 3001.571103] ? lock_acquire+0x170/0x3f0 [ 3001.571117] ? do_raw_spin_unlock+0x164/0x220 [ 3001.571131] ? _raw_spin_unlock+0x29/0x40 [ 3001.571145] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3001.571165] __filemap_fdatawrite_range+0x236/0x310 [ 3001.571180] ? replace_page_cache_page+0x700/0x700 [ 3001.571209] file_write_and_wait_range+0x86/0xd0 [ 3001.571224] __generic_file_fsync+0x70/0x190 [ 3001.636721] ext4_sync_file+0x8ed/0x12c0 [ 3001.640802] ? ext4_getfsmap+0x8c0/0x8c0 [ 3001.644875] vfs_fsync_range+0x103/0x260 [ 3001.648967] ext4_file_write_iter+0x5fa/0xd20 [ 3001.653481] ? aa_file_perm+0x304/0xab0 [ 3001.657471] ? ext4_file_read_iter+0x330/0x330 [ 3001.662072] ? trace_hardirqs_on+0x10/0x10 [ 3001.662800] audit: type=1804 audit(1677793014.492:2540): pid=27098 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13949/file0" dev="sda1" ino=13940 res=1 [ 3001.666315] ? iov_iter_init+0xa6/0x1c0 [ 3001.666333] __vfs_write+0x44c/0x630 [ 3001.666349] ? kernel_read+0x110/0x110 [ 3001.666373] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3001.666389] vfs_write+0x17f/0x4d0 [ 3001.666405] SyS_write+0xf2/0x210 [ 3001.666416] ? SyS_read+0x210/0x210 [ 3001.666437] ? __do_page_fault+0x159/0xad0 [ 3001.721292] ? do_syscall_64+0x4c/0x640 [ 3001.725287] ? SyS_read+0x210/0x210 [ 3001.729021] do_syscall_64+0x1d5/0x640 [ 3001.732938] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3001.738159] RIP: 0033:0x7f043d3b60f9 [ 3001.741880] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3001.749611] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3001.756906] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3001.764182] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3001.771445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3001.778740] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:54 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 8) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) 21:36:54 executing program 5: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x171f42, 0x0) (async, rerun: 32) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (rerun: 32) open(&(0x7f0000000040)='./file0\x00', 0x121000, 0xae) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000140)='\x00', 0x100, 0x101) (async) r2 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x14008, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x75b2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user}, {@obj_type={'obj_type', 0x3d, '+#:'}}, {@measure}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}]}}) 21:36:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:54 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x1, 0x2, 0x401, 'syz1\x00', 0x7f}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:54 executing program 0: getitimer(0x0, &(0x7f0000000180)) 21:36:54 executing program 0: getitimer(0x0, &(0x7f0000000180)) 21:36:54 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) 21:36:54 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1015, 0x1, 0x7e, "880754d028a3c2a5b1a7fb974b421692", "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"}, 0x1015, 0x3) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2, 0x9}}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x1, 0x1, 0x32, 0x1f, 'syz0\x00', 0x1}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3001.874272] audit: type=1804 audit(1677793014.892:2541): pid=27117 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13950/file0" dev="sda1" ino=14470 res=1 [ 3001.908838] FAULT_INJECTION: forcing a failure. [ 3001.908838] name failslab, interval 1, probability 0, space 0, times 0 21:36:55 executing program 0: getitimer(0x0, &(0x7f0000000180)) 21:36:55 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3001.930264] CPU: 0 PID: 27126 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3001.938179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3001.947561] Call Trace: [ 3001.950168] dump_stack+0x1b2/0x281 [ 3001.953825] should_fail.cold+0x10a/0x149 [ 3001.957993] should_failslab+0xd6/0x130 [ 3001.961984] __kmalloc+0x2c1/0x400 [ 3001.965537] ? ext4_find_extent+0x879/0xbc0 [ 3001.969968] ext4_find_extent+0x879/0xbc0 [ 3001.974136] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3001.979613] ext4_ext_map_blocks+0x19a/0x6b10 [ 3001.984144] ? __lock_acquire+0x5fc/0x3f20 [ 3001.988421] ? __lock_acquire+0x5fc/0x3f20 [ 3001.992677] ? mem_cgroup_uncharge+0xd0/0xd0 [ 3001.997105] ? trace_hardirqs_on+0x10/0x10 [ 3002.001363] ? find_get_pages_tag+0x4d4/0x940 [ 3002.005881] ? ext4_find_delalloc_cluster+0x180/0x180 [ 3002.011090] ? release_pages+0x828/0xbf0 [ 3002.015166] ? __filemap_fdatawrite_range+0x236/0x310 [ 3002.020464] ? file_write_and_wait_range+0x86/0xd0 [ 3002.025509] ? ext4_es_lookup_extent+0x321/0xac0 [ 3002.030308] ? lock_acquire+0x170/0x3f0 [ 3002.034401] ? lock_acquire+0x170/0x3f0 [ 3002.038483] ? ext4_map_blocks+0x623/0x1730 [ 3002.042851] ext4_map_blocks+0x675/0x1730 [ 3002.047026] ? ext4_issue_zeroout+0x150/0x150 [ 3002.051622] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3002.057083] ext4_writepages+0x19c2/0x32a0 [ 3002.061315] ? ext4_inode_csum+0x582/0x850 [ 3002.065549] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.070587] ? mark_buffer_dirty+0x95/0x480 [ 3002.074927] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.079688] ? __lock_acquire+0x5fc/0x3f20 [ 3002.083946] ? ext4_mark_inode_dirty+0x1db/0x7a0 [ 3002.088711] ? trace_hardirqs_on+0x10/0x10 [ 3002.092949] ? ext4_expand_extra_isize+0x460/0x460 [ 3002.097873] ? __mark_inode_dirty+0x33b/0xf40 [ 3002.102367] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.107121] do_writepages+0xc3/0x240 [ 3002.110933] ? page_writeback_cpu_online+0x10/0x10 [ 3002.115853] ? lock_acquire+0x170/0x3f0 [ 3002.119814] ? do_raw_spin_unlock+0x164/0x220 [ 3002.124298] ? _raw_spin_unlock+0x29/0x40 [ 3002.128441] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3002.133722] __filemap_fdatawrite_range+0x236/0x310 [ 3002.138731] ? replace_page_cache_page+0x700/0x700 [ 3002.143661] file_write_and_wait_range+0x86/0xd0 [ 3002.148412] __generic_file_fsync+0x70/0x190 [ 3002.152820] ext4_sync_file+0x8ed/0x12c0 [ 3002.156871] ? ext4_getfsmap+0x8c0/0x8c0 [ 3002.160926] vfs_fsync_range+0x103/0x260 [ 3002.165000] ext4_file_write_iter+0x5fa/0xd20 [ 3002.169499] ? aa_file_perm+0x304/0xab0 [ 3002.173463] ? ext4_file_read_iter+0x330/0x330 [ 3002.178045] ? trace_hardirqs_on+0x10/0x10 [ 3002.182279] ? iov_iter_init+0xa6/0x1c0 [ 3002.186245] __vfs_write+0x44c/0x630 [ 3002.189949] ? kernel_read+0x110/0x110 [ 3002.193850] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.198870] vfs_write+0x17f/0x4d0 [ 3002.202400] SyS_write+0xf2/0x210 [ 3002.205844] ? SyS_read+0x210/0x210 [ 3002.209459] ? __do_page_fault+0x159/0xad0 [ 3002.213687] ? do_syscall_64+0x4c/0x640 [ 3002.217647] ? SyS_read+0x210/0x210 [ 3002.221300] do_syscall_64+0x1d5/0x640 [ 3002.225180] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3002.230373] RIP: 0033:0x7f043d3b60f9 [ 3002.234075] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3002.241791] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3002.249052] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3002.256333] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3002.263592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3002.270861] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:55 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 9) 21:36:55 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1015, 0x1, 0x7e, "880754d028a3c2a5b1a7fb974b421692", "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"}, 0x1015, 0x3) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1015, 0x1, 0x7e, "880754d028a3c2a5b1a7fb974b421692", "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"}, 0x1015, 0x3) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:36:55 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:55 executing program 0: getitimer(0x1, 0x0) 21:36:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2, 0x9}}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x1, 0x1, 0x32, 0x1f, 'syz0\x00', 0x1}) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x1, 0x1, 0x32, 0x1f, 'syz0\x00', 0x1}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:55 executing program 0: getitimer(0x1, 0x0) 21:36:55 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1015, 0x1, 0x7e, "880754d028a3c2a5b1a7fb974b421692", "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"}, 0x1015, 0x3) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:55 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2, 0x9}}, 0x20) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x1, 0x1, 0x32, 0x1f, 'syz0\x00', 0x1}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3002.408793] FAULT_INJECTION: forcing a failure. [ 3002.408793] name failslab, interval 1, probability 0, space 0, times 0 [ 3002.421288] CPU: 0 PID: 27160 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3002.429191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3002.438546] Call Trace: [ 3002.441137] dump_stack+0x1b2/0x281 [ 3002.444782] should_fail.cold+0x10a/0x149 [ 3002.448946] should_failslab+0xd6/0x130 [ 3002.452938] kmem_cache_alloc+0x28e/0x3c0 21:36:55 executing program 2: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3002.457275] ext4_mb_new_blocks+0x514/0x3db0 [ 3002.461702] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.466745] ? ext4_cache_extents+0x19/0x260 [ 3002.471177] ? ext4_find_extent+0x6f7/0xbc0 [ 3002.475515] ? ext4_ext_search_right+0x2bc/0xaa0 [ 3002.480287] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 3002.485330] ext4_ext_map_blocks+0x2845/0x6b10 [ 3002.489942] ? __lock_acquire+0x5fc/0x3f20 [ 3002.494209] ? mem_cgroup_uncharge+0xd0/0xd0 [ 3002.498668] ? trace_hardirqs_on+0x10/0x10 [ 3002.502917] ? find_get_pages_tag+0x4d4/0x940 [ 3002.507520] ? ext4_find_delalloc_cluster+0x180/0x180 [ 3002.512725] ? release_pages+0x828/0xbf0 [ 3002.516811] ? __filemap_fdatawrite_range+0x236/0x310 [ 3002.522020] ? file_write_and_wait_range+0x86/0xd0 [ 3002.526971] ? ext4_es_lookup_extent+0x321/0xac0 [ 3002.531746] ? lock_acquire+0x170/0x3f0 [ 3002.535753] ext4_map_blocks+0x675/0x1730 [ 3002.539933] ? ext4_issue_zeroout+0x150/0x150 [ 3002.544456] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3002.549926] ext4_writepages+0x19c2/0x32a0 [ 3002.554184] ? ext4_inode_csum+0x582/0x850 [ 3002.558442] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.563475] ? mark_buffer_dirty+0x95/0x480 [ 3002.567814] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.572589] ? __lock_acquire+0x5fc/0x3f20 [ 3002.576861] ? ext4_mark_inode_dirty+0x1db/0x7a0 [ 3002.581634] ? trace_hardirqs_on+0x10/0x10 [ 3002.585888] ? ext4_expand_extra_isize+0x460/0x460 [ 3002.590833] ? __mark_inode_dirty+0x33b/0xf40 [ 3002.595352] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.600132] do_writepages+0xc3/0x240 [ 3002.603929] ? page_writeback_cpu_online+0x10/0x10 [ 3002.608852] ? lock_acquire+0x170/0x3f0 [ 3002.612817] ? do_raw_spin_unlock+0x164/0x220 [ 3002.617305] ? _raw_spin_unlock+0x29/0x40 [ 3002.621620] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3002.626957] __filemap_fdatawrite_range+0x236/0x310 [ 3002.631983] ? replace_page_cache_page+0x700/0x700 [ 3002.636937] file_write_and_wait_range+0x86/0xd0 [ 3002.641732] __generic_file_fsync+0x70/0x190 [ 3002.646139] ext4_sync_file+0x8ed/0x12c0 [ 3002.650194] ? ext4_getfsmap+0x8c0/0x8c0 [ 3002.654249] vfs_fsync_range+0x103/0x260 [ 3002.658306] ext4_file_write_iter+0x5fa/0xd20 [ 3002.662801] ? aa_file_perm+0x304/0xab0 [ 3002.666775] ? ext4_file_read_iter+0x330/0x330 [ 3002.671350] ? trace_hardirqs_on+0x10/0x10 [ 3002.675575] ? iov_iter_init+0xa6/0x1c0 [ 3002.679561] __vfs_write+0x44c/0x630 [ 3002.683273] ? kernel_read+0x110/0x110 [ 3002.687165] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.692182] vfs_write+0x17f/0x4d0 [ 3002.695739] SyS_write+0xf2/0x210 [ 3002.699201] ? SyS_read+0x210/0x210 [ 3002.702829] ? __do_page_fault+0x159/0xad0 [ 3002.707143] ? do_syscall_64+0x4c/0x640 [ 3002.711112] ? SyS_read+0x210/0x210 [ 3002.714732] do_syscall_64+0x1d5/0x640 [ 3002.718617] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3002.723793] RIP: 0033:0x7f043d3b60f9 [ 3002.727490] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3002.735220] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3002.742508] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3002.749765] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 21:36:55 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 10) 21:36:55 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:55 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) getresuid(&(0x7f00000024c0)=0x0, &(0x7f0000002500), &(0x7f0000002540)) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = getgid() r8 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r9 = getuid() r10 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) read$FUSE(0xffffffffffffffff, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r13 = getuid() r14 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004740)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0\x00'}) r16 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r17 = getuid() r18 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r17, @ANYBLOB=',group_id=', @ANYRESDEC=r18]) r19 = geteuid() getresuid(&(0x7f0000004cc0), &(0x7f0000004d00)=0x0, &(0x7f0000004d40)) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000000c0)="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", 0x2000, &(0x7f0000004e80)={&(0x7f00000020c0)={0x50, 0x0, 0x9, {0x7, 0x26, 0x0, 0x10, 0x65, 0x5, 0x8, 0x8}}, &(0x7f0000002140)={0x18, 0x0, 0x2, {0x6}}, &(0x7f0000002200)={0x18, 0x0, 0x8, {0x7fffffff}}, &(0x7f0000002240)={0x18, 0xfffffffffffffffe, 0x100000001}, &(0x7f0000002280)={0x18, 0x0, 0x8b, {0x5}}, &(0x7f00000022c0)={0x28, 0x0, 0x100000001, {{0x9, 0xffffffffffffffd0, 0x1}}}, &(0x7f0000002300)={0x60, 0xfffffffffffffff5, 0x1000, {{0x401, 0x2, 0x5, 0x8, 0xffffffff, 0x3, 0x80, 0x7}}}, &(0x7f0000002380)={0x18, 0x0, 0x8000, {0x5}}, &(0x7f00000023c0)={0x11, 0x0, 0x75, {'\x00'}}, &(0x7f0000002400)={0x20, 0x0, 0x9, {0x0, 0x1b}}, &(0x7f0000002440)={0x78, 0x0, 0x6, {0x7, 0x7, 0x0, {0x4, 0x1, 0xffffffff, 0x8000000000000001, 0x8, 0x8000000000000000, 0x1, 0x7, 0x8000, 0x4ddad82438fb57ef, 0xff, 0xee00, r2, 0x4, 0xb9e8}}}, &(0x7f0000002580)={0x90, 0x0, 0xffffffffffffffff, {0x0, 0x2, 0x30000, 0x4, 0x8, 0x9, {0x5, 0x0, 0x7d, 0x101, 0x8, 0x80000001, 0x5, 0x1, 0xffff, 0x1000, 0x0, r3, r6, 0x7fffffff, 0x91c8}}}, &(0x7f0000002640)={0x70, 0x0, 0x0, [{0x5, 0xbd, 0x14, 0x7, 'security.capability\x00'}, {0x2, 0x6f, 0x14, 0x640, 'security.capability\x00'}]}, &(0x7f0000004780)={0x540, 0x0, 0xa1, [{{0x1, 0x2, 0xffffffffffffffff, 0xfff, 0x6, 0x80, {0x5, 0x5, 0x7ff, 0xffff, 0xe0, 0x1, 0x0, 0x99a, 0x101, 0xa000, 0x0, 0xffffffffffffffff, r7, 0x757, 0x200}}, {0x2, 0x0, 0x14, 0xfffeffff, 'security.capability\x00'}}, {{0x6, 0x1, 0x3f, 0x3, 0x5, 0x40, {0x5, 0x101, 0xfffffffffffffff8, 0x7, 0x6, 0x5, 0xa8000000, 0x6, 0x664, 0x1000, 0x1, r9, 0xee01, 0x7, 0x9}}, {0x1, 0x8, 0x1, 0x8, '\xbb'}}, {{0x2, 0x0, 0x8, 0xca, 0x4, 0x7, {0x0, 0xa1, 0x2, 0x80, 0x10000, 0x9, 0x4, 0x3, 0x1, 0x2000, 0x4, r11, r12, 0x60, 0x3}}, {0x0, 0x0, 0x0, 0x3}}, {{0x1, 0x2, 0x8, 0x6f, 0x10000, 0x7fffffff, {0x0, 0x6, 0x8, 0x20, 0x6, 0x500000, 0x2bf, 0xeb, 0x20, 0x6000, 0x723, r13, r14, 0xe72e, 0x3ff}}, {0x1, 0x0, 0x1, 0xffffffff, '#'}}, {{0x4, 0x3, 0x0, 0x4, 0x8, 0x481b, {0x2, 0x5, 0x6, 0x2, 0x1, 0x3f, 0x80000000, 0x7fff, 0x1, 0x0, 0x7, 0xee00, r15, 0x9, 0x400}}, {0x0, 0x9, 0x14, 0x747, 'security.capability\x00'}}, {{0x6, 0x400, 0x9, 0x9, 0x0, 0x9, {0x2, 0x8000, 0x8, 0x7fff, 0x2, 0x8, 0x3, 0x9, 0x9, 0x1000, 0x4, 0xffffffffffffffff, r18, 0x48eed541, 0xa778}}, {0x3, 0xffffffff00000001, 0x14, 0x0, 'security.capability\x00'}}, {{0x3, 0x2, 0x4, 0x5, 0x1, 0x0, {0x3, 0x101, 0x40c6, 0x6, 0x100, 0x5, 0x0, 0xfffff786, 0x1, 0xa000, 0x1, 0x0, 0xffffffffffffffff, 0x7, 0x6}}, {0x4, 0x7f, 0x14, 0x6, 'security.capability\x00'}}, {{0x3, 0x1, 0xb9, 0x5, 0x7fffffff, 0x9, {0x1, 0x1f, 0x0, 0x8001, 0x800, 0x7fffffff, 0x7fffffff, 0xff, 0x6, 0x1000, 0x4, r19, 0x0, 0x619, 0x800}}, {0x3, 0x260b, 0x0, 0x8}}]}, &(0x7f0000004d80)={0xa0, 0x0, 0x0, {{0x5, 0x1, 0x8000000000000000, 0x7, 0x6c77, 0x8, {0x6, 0x9, 0x7, 0x8, 0x7, 0x9, 0x800, 0x6, 0x7, 0x9000, 0x3ff80, r20, 0x0, 0x20, 0x80000001}}, {0x0, 0x1}}}, &(0x7f0000004e40)={0x20, 0x0, 0xfffffffffffffc00, {0xae, 0x4, 0x0, 0xe43}}}) r21 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r21, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000040)='./file0\x00', 0x82200, 0x27) 21:36:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0x3, @private1, 0x200}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0xffffffffffffff01, r0, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e22, 0x7, @remote, 0x3ff}}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:55 executing program 0: getitimer(0x1, 0x0) [ 3002.757026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3002.764376] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:55 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x1015, 0x1, 0x7e, "880754d028a3c2a5b1a7fb974b421692", "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"}, 0x1015, 0x3) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3002.868883] FAULT_INJECTION: forcing a failure. [ 3002.868883] name failslab, interval 1, probability 0, space 0, times 0 [ 3002.880310] CPU: 1 PID: 27186 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3002.888218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3002.897576] Call Trace: [ 3002.900171] dump_stack+0x1b2/0x281 [ 3002.903825] should_fail.cold+0x10a/0x149 [ 3002.907997] ? kmem_cache_free+0x23a/0x2b0 [ 3002.912266] should_failslab+0xd6/0x130 [ 3002.916247] kmem_cache_alloc+0x40/0x3c0 [ 3002.920314] __es_insert_extent+0x338/0x1360 [ 3002.924727] ext4_es_insert_extent+0x1b9/0x530 [ 3002.929319] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 3002.935169] ext4_map_blocks+0x887/0x1730 [ 3002.939332] ? ext4_issue_zeroout+0x150/0x150 [ 3002.943831] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3002.949293] ext4_writepages+0x19c2/0x32a0 [ 3002.953538] ? ext4_inode_csum+0x582/0x850 [ 3002.957772] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3002.962806] ? mark_buffer_dirty+0x95/0x480 [ 3002.967137] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.971909] ? __lock_acquire+0x5fc/0x3f20 [ 3002.976161] ? ext4_mark_inode_dirty+0x1db/0x7a0 [ 3002.980913] ? trace_hardirqs_on+0x10/0x10 [ 3002.985148] ? ext4_expand_extra_isize+0x460/0x460 [ 3002.990082] ? __mark_inode_dirty+0x33b/0xf40 [ 3002.994588] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3002.999358] do_writepages+0xc3/0x240 [ 3003.003158] ? page_writeback_cpu_online+0x10/0x10 [ 3003.008088] ? lock_acquire+0x170/0x3f0 [ 3003.012067] ? do_raw_spin_unlock+0x164/0x220 [ 3003.016583] ? _raw_spin_unlock+0x29/0x40 [ 3003.020732] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3003.026015] __filemap_fdatawrite_range+0x236/0x310 [ 3003.031039] ? replace_page_cache_page+0x700/0x700 [ 3003.035981] file_write_and_wait_range+0x86/0xd0 [ 3003.040740] __generic_file_fsync+0x70/0x190 [ 3003.045156] ext4_sync_file+0x8ed/0x12c0 [ 3003.049228] ? ext4_getfsmap+0x8c0/0x8c0 [ 3003.053300] vfs_fsync_range+0x103/0x260 [ 3003.057401] ext4_file_write_iter+0x5fa/0xd20 [ 3003.061909] ? aa_file_perm+0x304/0xab0 [ 3003.065894] ? ext4_file_read_iter+0x330/0x330 [ 3003.070481] ? trace_hardirqs_on+0x10/0x10 [ 3003.074710] ? iov_iter_init+0xa6/0x1c0 [ 3003.078796] __vfs_write+0x44c/0x630 [ 3003.082650] ? kernel_read+0x110/0x110 [ 3003.086642] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3003.091840] vfs_write+0x17f/0x4d0 [ 3003.095387] SyS_write+0xf2/0x210 [ 3003.099052] ? SyS_read+0x210/0x210 [ 3003.102689] ? __do_page_fault+0x159/0xad0 [ 3003.107045] ? do_syscall_64+0x4c/0x640 [ 3003.111028] ? SyS_read+0x210/0x210 [ 3003.114679] do_syscall_64+0x1d5/0x640 [ 3003.118583] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3003.123765] RIP: 0033:0x7f043d3b60f9 [ 3003.127483] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3003.135207] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3003.142483] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3003.149772] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3003.157047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3003.164339] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:56 executing program 2: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:56 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 11) 21:36:56 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) (async) getresuid(&(0x7f00000024c0)=0x0, &(0x7f0000002500), &(0x7f0000002540)) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = getgid() (async) r8 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r9 = getuid() (async) r10 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r13 = getuid() (async, rerun: 64) r14 = getgid() (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004740)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0\x00'}) (async) r16 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async, rerun: 64) r17 = getuid() (async, rerun: 64) r18 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r17, @ANYBLOB=',group_id=', @ANYRESDEC=r18]) (async, rerun: 32) r19 = geteuid() (rerun: 32) getresuid(&(0x7f0000004cc0), &(0x7f0000004d00)=0x0, &(0x7f0000004d40)) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000000c0)="58e7f223ac3766883500e0c3a3155c70c07f7e78f5272cba973ace91ec06c250402a4e822a5af567287273f9e10d877a9670f14b9f30bba7b0ed4354d11449a850f7c5a08cd00b3cd77d71c25e00aedf91ee834d1487398100f5c0bee538e69be8ab27b32a6e85636aed3f301a129a7b8f82c22a92818fe81371fae56292a88105a61a4df50eb7a1d5949c9ce05d70039da6311418292b7c1ded51f614cb76ef483af938f8aae37359dafd71bba154e7aca41f019198f4cfbc0b5dc9a7e7b16d8355f2607781c69ee3ed9d637ba6690c76d7178a85b0297cc3072fe0a050551f3b89f806f99e04d25b6cce77c324ec6602c7e1cb323419a2eede008fb9b6735b1da87a1b812d25cadfb89bc450c9cfbb9084e65ce041ba3925c1375ce11980cdf95ecd267542e6754ab3e208ab92c87e57d81bca8b82ab4b8482f5b48fa450e6b1ee02a373aa98211b076ebe5403d12ad9cce5eb7b659e9df67705a784a8a730f2a1aaf0af90a3896920d6bc09658cfeaa6c4dafc58a8048a35718aa7067be288b35ec08a51d72f5680b7b6d1d538ba4df24470c4febd151f90ae4b919a7a2329d876f8fb636be51a24cb98f598752f757a7c06308e4912e89f97aef687c257a1f524e48b7a94225d9ae133867a73e1be6fc8e1f1cd7fbef66e85564f95691092591cf3492fcc2cf9d82e24e5728da9f4aa0217fd6bcd56e63c92cf15f45870bde3092cd1a984f779164f44ebaaca94103db6acf657cbc1c9ca56248cb871699aed2adeaf4d2383fbdc414b4638bbff2a01ec74423cb802860a1cea3ff8950805f0153ee1c719ecacb44bba2c8a78a99fe45982cb36721ac91c5b12a38ba432912cbef9122e2eed39dd63aa9bce11867af701aa018dc4a3ac337b2c3c3cbb5cd29f8ef770abaf1a9ba1651f9b8f8e154987c818c3960c423e2ac5f4c8267fbdb9ba5c4d3dc5a27a8cf6acc43bac886342020d58316f0b7bf46620a9fc740223aa27f5aead28d48fb1bc929950103f8b5fce17ce1c946915696d39376ca0f2943c2014a832dd378d183038536c2695a2faf57a5e85ebe79e0bdef78f71acd1722da43d81929b9302e48613ae893b42c34b0fe3123660f670c83ef2d9b366c192c96f63be1512b1aa00a3909deee35948d71c55c329a1d4efb46eda5b504b8abfa7c9825c0e3289edb942f1891c7ecf0524841cd862336148da8ccd375583b03a74178611a5ad93200652c8902f40876d3aef928d0d2dd1c1494d5321cc23daf11c57d978fe3fe5194eea53f5d558b4a0da644c37afab505762bb0cae09d08de93429a1ff436d182e02b516ab34f5392d4a7809140397af81d1fd41250eb61f878d5cb118414b97921df1d1f1304543ecda6f02e1f7553d5eb5333739afcbf2b83ebe8ea22fe3c3bfa611141b1c955b309680a0d996ffe2572db68bc9ede659bf7b61ee65c1e1d0f1b2c767ed27e6dc56fca9ba6e1febbe8ba27c350a365b82e4b86fe47e8cda83440ba962795437487ff29251557b94c1a8188609e0235803fb91e41faef2f5dedec7e293cfcdedf58f59b9e17fb7db89602a4c12077d64ff7cf82da0ee71e73ada6f19c1a8d21027d0682ab47c69616f6cea6c875558a0aa224a65be31ca30b1cd9d9a98996a881304f308cc1bb5a6326b235bc493fe6a60caa0ff933dfec9880d1bae752938828a1ddd8dbc7d35b577d13a6dc7ba36e927ca4a09711b422284d96f45a7dcf3204c9a8e9ef6b29615ff43c5891e1e2dfba2268c6956839da66fc9002a42d2c92de14c4006c752382c3601ea7c05ec418c4304fae2cdee9f496a6f4dda7ac77666499bc178ba2fd4cd6dc567e37154612a1a767ee2485786f47b60383515852a65d6e2b2d03df112f5effca144e0cf1a46cb84a0173a9422b321e9e840d96606c8fb0ee11c42959aea83daadbf72056caf502323874b741b5ade7df63dfaab32b0383a7cdb4fe75f6857f30951f3750fa3a2e14fdbe8d99f1b0b60007afa6648b1e9813ea038e7e39f20763c67f5e8e4e537cace8554da5e3f93ebbe14e4d112bd6f854ebdc7f57150025289d8e5cabce8bd0e3563af621ac8d58e33f2fdf6fabe4662b9ec867e4923e3de26b27773f0ce1168e25807e4f27b2f4e2e297ee366d2ac8c8ad891062efe0dd2740cd85cb347171575f1f61abf405a48b701174ad17aa98d8cf3f6d1864edb4c6c9eff897d95fdd6f872810b7b6c6f7bb749d4b1a9b516e4e581d44fbcb44330a37f7ec5512d1e059141725de4d6b5960dc56ffd547587520550e0d184151a4f90741ac75c60886660df8214776bdc46a215ac99ec48f65cccddf55b6fc9d680fa2b4820f6c5a4e0aa6149ccb1d2ac539c7bcb47ac5813a5839121647e60c313f60a5b2dbe5cad8b654e5f2bddc26de868c027b3d6da749174a0051ca5e79fbe37d02c5246023a57b2efac49ecac3a717c4b71c7dad4c92538f9e008c38a35cfeabb585697a4e090c8781e40bf0ae18178cf4bd1fc13c31461be73bd9b24e652a9e2bd7d4dc79d5d7c2e169fcfa6fb1970f93600df3d64f4a3327f3bc0272184a68ecb5e240944f396fe1f48f41b183a92147bf2a9ca207c65ff3517116ab024f4d557f2bd5bdb935e4c0561e61c7d535af65237f342796e1c6893ba8a1ae8900213a1a189978a8244d33f802afe74682a1b3b813d960c49df2b0f56e1d531442a137a0db406cf753f15357c4feb3a1eb60fa06286cdb857c0d8526cc2a1df5d988d3ae59e77ecc3ccbe355417904aab54cf7061e6a95b8ea7b7e3ea0661ad1b97dad5946326fd9828c0241067845585ec327b5f127e3cb732f2c6fba2349f33c36fc0816b8dc608f111c37f23cefa363ae521a10871261f40f15001efdf812de96eb830c723de9199b688c1ed3f10a4678ec3c02abd5cdc1b442387efd20974e256b3f2f99c4baa5842949a04a5b55587a475b61c7a6bfee02d7c686ce7e94efd09887cc0cb2312d46de4279240b8de4e73b8bec559d8567bef52245fe3eef1603353058f0a57ef50127342fad4639fa1295e731c332507764ba4b5cef64ae0f71994b9272b7cf4bc60367ac34140f88dfed523c2dafbb5070354e220931bed8e24d5019fa4d34999333647337837dd13088a9f5b15c9f214ad9fb96931efdb2f6f96ccc27f1fcc6e29dc5b55e2b84f214474c1dd6973ca761e2b93ea4e054fb134536224b76ed7188ccf78de5e983bbf9ea77ce98f33499a227631dfe6e2e0409602effdb60c9b6d902d3dc45dc7e9fe11228f0b3bc553319ec32ea98ced587493e109c255150fcbb78e00242a4375c0541e8ec7c2b17494385b58143a65a010dffb0d6afd0b34770e7e2b735e69620e38eb748083df84c1482b8f4c88a352c10be1068662b75484827f11db4afd6fea96442242f3ff0b11cf4e437a2c690a2e6c77828c5136cbf59584a8d0e720ed05731c4e7357a7d2f3e17757e5736645cdd5e1827f9e6e49f10c654b0eadf676d3e06cc8440902efb22cedc0522c0849f0c4aa0426d5a80ed5543dbab7ed9a09f65af0c462ceb8eef76d80be309726d2629b4238c8aceeb2dfbb8a6b7f245cbb5f61a6ea2fdd0f2fbf7ae9822aadbc30c8ea8435e4c642fff7df769dd21a9247bfb107f9995944a453418a33af61696fb4c3b585b608d3ee1365bf3ab30f12d98aefe2f3880f0c480292b33034c36e16d580d57a1c8dcbb28657a77f271e70a0853271038e910c4c35d7005e0af47c52c0c669a2a86f25693b4a0a08be5d2d1ad184cc1bc3e34ec2a8a80a6ee3e4cfdfc6ae893dce8e9e574db65952e92f81e0ae941283fce85016e9720de180ba261df69defdd09966a7c40d81919a89e41b4c98694b6ec57f4ea294320c53efdaf56aa26e5ebc2abe862f2256fe894b5bba9635f47b6475bdd2e4a8a09fca0f2de81238b1417efdfc3754f3dd843ff818fb4d137cf1503b451e5b634adbb0e8b01eae02463368f0326a852f5b22cfa528adf394379df5bbec867ad9788dfcfb1f5c1b7468dda78a915a2ce2face01667b08aa4398592ef39c359fc3ef99978b84ec40dee5217bae6e624c4c21b919ecd0f1da58d0dcef94fc765d50c99876619feb14698227ec98b2c79ec5314c4bbc2de6a73e34574ee7db257080e78b3959ba5a1aeb29e9e60d8f30a8a26a83e89375a8033d53d50f08ff3228fa90e7d8d5ecf92b0a9a18d80f82cc725679d714ffa1c3456d2027060e91b2bb46c5755924bf102b0aa9d2b1993bc897ca8650c103c5d89fcee5928dfc1a70a224068da04fdcfea05ead1c4178e17d2b3df22dad3c1dfd4044fc9876f87b2c766c685cdb765c75d8ac2ba3ea371fe52e22b8fbc5904f1e5cb5cecb74f91e2d8c540b61449029c8b93d357a0b4f3cd9dbbdb4230cd59cbec1ca81ae0a921981d005edddd774d3a1325f6625e3fcdeca30576aa78cdd573ae25b4c871f4ba06a59fbe54364f4afdc80839b2e2854c4fcf355baa6b920851be724e91bbc80e3f8fbb6696b4361522933e29690b8db25bc5ccb7392bb2a875308191b616ad7d1105ad4d56ed01e74e3011195f49eecc32898a3718358c0e0f54d531bd201e9d4452ae25c59865cc4ced0ac084badf86525675ce7515b2cf56c2978cb6510e58565521871758e0d00c1428862c17a77e28f4b08b93520996ee7e7e287edebc77a50144c1c0b39509efc661e41cd31dda04039f7fe02e6c091a90e41f799696a85c27a612e0bea9f85b9c0cb138bf6337f4d4fe25295ada04bc0fdadb999f0c92120817b5c7e3339beaff6730cffac06ca6d74ae892dd5f06f21b5ae50b760281a392e7b331a8f3cfc053d298eb47751b52699b41db4e98ca1a270b82091e915da3ed56be3b6a2d97ca1904f0290a54dda0fdaf5856ad1be6afd6ccc3cc5835410c47f4c650b1e4017c831ed3a9610d8391e5c7b8def5aa00f4f3bd1ed85899b622178613be8e5f8abf45fcf7a076bb4b0720b5b2fa716b4436b0c05045632881ed5a54fe721ab15860f585261b273a0162d08bd9b5a0804b604ff965d72ca7aa90a89dcf0920a0c929af181fb5ffd6d93eca68e23300adb14e36a874647dbc3905b87ff6c5827a5d1bdb4b714a933a5321d8d00b1ef0eaf782588a65da18810a322715670f3e5899eec1fabcafa12d2474d5e74a90abb5137fff3f30b83f8273340dadc0b65a3326547cde0523bee800e495be676f9abdf5a59ba0bf502ae967f427ba515624413545be0a5322ce025eeb5fb8a8fef8c3f973e6c11fe0c23becfab14c8d35ddea55f9d5cd3f11fc2611f411ce9f3f1e9757afa237d755ae2b143921a41bff1e30a7c8fd2d70016da4d9755763208f5096a13921949ea36884eacac2974c6720869dd764ea395bc3258447aa019e2a34c32698f2973b3cb8945b07002de2b6b787ce7b815958afc5e8da241aefb604952eb02e0ed0d54fc48d2b3becf02e7aa8ccfa9e49072d3f34040e9f7b86e50c7851d12fa357f1d258eb80b8535fe7540fc0f71bbaeea68d8186aa0ef2b2b8b908c537085cea698b5c18c235b997a80e35b5a4e9d1e35c03d6199676c37d9dff12535db7389c57abca5744388aa8af2609930991b24ce97eb352de3cf25ce3ac30290d35209993f23f5024670315808c3284bee8eb17811aa13ed2c43599ef5a94d4ec7144bad8a5148dd9b4dbc4f04832ee57ab724b132edac98d7dc4737f6a87e85aced47f368e92bb48b6dc159e9aace860ba4e11bd99084625e87a2afdf983172664a428a691811421cc4c6062500e364fa9a7d6409c4a4c2640dec8fcd850c88cb238a031a1397c1ae1ba3e9e44541fde062b06814bfb1f944bf19feaafe5ecf3bb6e994c9057c5e158f47a090fbdd0b2d6a4c973290c5a5e61342d1597d44b31470510c5c3252c27529cc1bbd969d1fed6207ca0696225579caeabdab8bbe6f3eb825647c9c01f1f4ee6ca4310697f7f38f2b9e6ead62d891d0885c790010115621c1827020fcd94f552596c11f4ca07cf2fdd39352f63c50a4e5db63c414604ae181bdfc0ad2462e0720650399dbb39695f59ee879d25626f7343349af62893f35c319b4e0832bda52815d993bbbd3e18d937a1f490f196a87f8514976e965c577b5e027fd4e540e734f750cbe3e910fc31d33aa2b7a308439adbaf80e765d5e1d17f3beeb75e7557e4fac81b09089189efb8a19f4602f16254eabdeedb05590f9ab9a9f9c0e5da56e33e071b2673c468a597f50fb5dc0d8b6a82a43dc2e469b56dd0062bbd67616e8f16d3dd1fa2c6b2906dc08bbc0f50324242d640f81a000db6f5bc64f68d61348ccd267385a6854ce2bf858bcdceae9ad5dbd6cb623a9f1280f48c3fd666d5dc7cffe9c761082cd040c295b888b9cc97b80b0264e73bc264b99968855df1998ea1f65bfbe1e62fd681642fa5da33ab266e0ff5629cfb726205a705b8dee15ded1812694e2e0fba563045a05ea0d67faff21bc209ccb8f25ea26d39e154c568a9cdf001472c1d7f477f0c78b3beb7a976811451e590c05a65b70a885f308167e4189b23d27f4f11583cf49e06a834cc49cb54555ff363c776091647444a9eb9cd87f3855ac74bcf97215852b24ff6ce4471e1379a325ce868815c298613e7a859fbdce2a264028e118bae7c4077e3a830378bff3495ac650f52c20ef9f7c6e10a60d0872a60d6102b043831b7748ad952d4776d0c607961e3d63f5fed41bf279304dedb94ac250133ebf42d989a34c809f98287ce02924f31f10695cae4a00c596963e46c46e601f2e15a02dabab59e382a7caf07e2e5c1b23cc93defc4e98281f0a1106ee20c24751bec91dbd6680e5672dfa27a5f4371d67e6747b01c35dbd2096e2dc6c3c478223bdba2594529cfa6f7843c529d20cb97634edd15d811982b7cd14dffa0ca29a9bfa5822574a2f0db274d262a0b13426d89d832a64965e9f46f94f8011d317ca0adbb0ae835e1373942ac8ae3f123934af523d8279780edf34bd2ad1b7343591a4bcbfed1292c2b4335ab5dda1849f46f80c78d23aeed3b8d2aff97083d272644b80461550ce93945f51ecf623fb9d5bad4be22029d5ed1cc80db92937024e2077bcb4f05c95f3a9225a91cae7915da7f13e22feafffb935720dd5fa760d954ef9fb18241ca34e24eac3fb4dc8646e3c8e89dbef9581bea1b0540f034be6822b471b2450bbe6374586dc77c82a9711eb579a81c7842ac447b565ca713727c13b299041fc069d8dd83ed1bc314f2963921cba460f05adea871ad53702e48ccf74d0b82f4b7497337f62b7243eaeb133c3f50b55e6106c29008fd908b4429c56972a33a26e37cc915ec00219eb4ba0f801f0de79c6fad9e9b053953f3a701706b12576dd786df40f76f07adb84debdda91024c42b3f62911033de597dcd29299231542ece35687b3706e1804f9a6c049d3f5b0f48abe3c6b6c1397a7996adff50f703276072095ba353adc865c4f0688d7353a55152ed61a9366f185b70b10727661d803297ce983bcad31001e543c5d8b7b1aebb8a18bb4f532f335a15b29671e7f12a453384316ebe92725d50ae105c08e3c19f96bad6068937495c18a7bab50ab99730b6ad0ab64e0dee1ab9b5c1be14c92ecef470663236f7c17819fb04891a7bce7f1ba5e906d2ee5c6b53041a8f24164972b990dc0538974be125e71f98581bf29134d9152902e8a00aea879b9bd7e9faea3329589b1f4a3df862893231bbfaa040d1897d45828965b680c7cd17ce612483af98676c7440559d5908158768b5a6e99fd2636c4771047388d06b872c0996c5179b526f969bd9815ccbd8a54aea65e77e9d2afff96db45e6aca413a562aeb5ef7f2e75eff264ae3d9184982c94f52867a8f18b4dee1cce263cab566b83daab3e1850a1556ca7a183f1c7a1a90bc12f3b86341f13471fea589df98414696232cd29265fdff9a3505dd859027d7d422c768e5f5682c3243f7d52e8229d8fce97220a23051d71b5d858b830aa14dc65b70993962b4de66bcadfe60eecd71b83ac7d73790041c23ee8119cb36cef0e66b45212d152462f013ce8a9705d50200386ad3e11d808f6f8fb38d56ab5e34ec09cb541bf6ec782b1d52faf8b253fd606b909bb031fef2e5f983ff5dcf1a135155dbdd22d06d87e68430887c4444d82e1417f062626c59d80c48ad4e49ee3a66207a41d0b14e7fc83a8e4b6c5bf7a32286c5951d2830295d515b5feb255381b3f2722e48fa46569cee88cfb6b159a79d6a81e91b9f4c83386f8a0b8d5ce6bad6fbd02c5ccc00f6e71a048433b9b9659ff4bed77f1a132aaeeb955389308f547e0695263e35b99bb7f009f63613037b7d2585b4da8f3bd7349dc4a8dc45f847592f8140c8de0b34f71d42d9516bb252ec71d5894478b5e401c0c25094d2c6ce9c0d7e4c08965ea68e714f3f3a174fb2b285f2000723ae6bbc5c2c76455c008ea930ef17ee975b8e6d8a49694f14b01763bafe3bca4e2dd449a3274dff81dcdfcbdf874674c704dd4f415c9809dcf3306cc41f7ca9280904d3d7aa2798049c60dabf48e1058b7554f9e2e6d048ea11c835506393aa7bc088bdb09d177d9e17f24363684f1262bab99f13e2232cf2f3b4b637a20a95b56e86bc2a3790d53e1a0f4e86fa645c77d6cd87bbe86a671488e041ac137b7ecc529cd07866c06cd90493db87735c026f1370ef0d565f94c386ba4fdcfe881d8d24efe69bd9124fb8ec42ddf3a014dd8f6e1d9426f18f6e330e25e21d01064aee34c5af1f4c6f536bfc7e65e03a38db35bd27d2b75aa1e8e6296ce1b8e000a1f695e8db945ec4cf51ef13d589eee7f57f5fd0bfa4215b087f24fd681b619148407e66ebf305cc73f0528662e44437ae7f2c9480e7a1883cccf3951a83a6bed688d338cbd05b17ded8ddd99ba1f53c91dd9b09189252413d7d169c99359329fe961ad4e4bd604d8b971efdc1f0a48f8a86f3fba600ab95c9d19b786de40f1871015590b313033fe23716451a9204d4eaf33d551afca2b3e52a16382366776cc6b8d1bed9d05926b4455eef10cbfdf42cbd3c2ac76eb3d32c548c271a912c8074329870d24a6d4174f8554abcb20b477253e3c1ce7f6b9fd3995079ad6fecbba41a02967d2e228eec44fdd521c2396dd24bd51bdfa39380190cd19c6324c7a952fe606c13680ae3e2783aa76386ef1e466b924de8e59a84e7c2dd5c496b4eb9672146946e745cfda0f0b68e2ce95c2a6f537565742edc573836534f08387d88b054633e655348465af39b8f9288cfbf55352f61ba0b0f852f1e8b806f9db20c60403947553518a7ad3e0bbfdd884d81c14a24885f2e26bf524bbe82b8c03c6eddb86b3daecd5eab17a6a15747e52a83ef85eea4e20fbb1d1cd57773193a1ebe0cf3f8112cb5244ac8818ae0f77c478cf84c1ddb91c0b0a210c61d843f845fa86ffd45f9eb647631713456cf9a82e03ee33efc2784b46d9a3478bd0b826ecc90fce0eaafebf61040cdfda8af00a7c439338ae79a42559899a365354f81454db82a34e8b5844673f0691da0bd13d680ca18766f5f6969c79fa779328a74621efcab7b4b88e9c207da4dc415ab5fe9701c38c54edabb6003bb30af26a89b3dffa708a4292484c08e3fc324a4c92f327148ce6d8c45e5c005312c84608d48729971b5eb2e0af608dfdee70e22511a4e75a77bb010e8eb86801116c22b73db4f1995c23fb1007b54fa9abfb4c21166fcf7daedfa5cfc2550558b781b4bcbeafe94010cc2ceaa753d1799e5eabf03250e76a08b980d00a38f0651c7df2e24269a9636130310f298f21e3c393fc3ef74d403ea2f63f8ec0a86fa40031cacb4a3a99b514048cfaf3a97f45fc15acdd7ad9733a7943a35f5ac9eb9f56ae435cc0588049af21539c16aab8c4cef0254560b8f397a75565fb01448299054e544cb4e3067050ca0e74199d6ab4c97fcb3ef3c7fa991509f3d09f84551db639e4db30b3ca524364b6bbc08edfee0002e84587ad49bd1f2edc008d81850a73ca4b107fdf6ebd4472ec99fade0a3f7a9572bc4043790efdd483906e0808db7a1b46a6bcc5907ecd8c2448f6d38842111dd40586d376988f947a5353f57bc22c10303da59d475b83f4128b24f6d96b08f039ade54aabde9362c2478b574c246a8617b2ea0d70ad6f0c4ef5245bc26a38fc39efbac741c6780378b6020bfb17077f7b28cafa132d1a28aa197b9593211e6b473f499de2d8ae72eeda1bef5a5013538cdd701bc4530ab9c4b62bac0e97276f5c53d384d04fcd70fe0cb822b4d9d12fc8683da6b27a977bb503b148a799ad4abb4ef4e2e7f5a33f8c87c060760efb54508464df900a6724b3f290018961fd91c4d4e6acf65d8af2dd5ae1191779255357e059db88cb606dba3545f5c08b9c4dd51d4ee7eb0f44ab67e330975804b60dbd1903613343c5b18d112c8e85acb8bb75fba553c7540b217ad0fff60f3b4c03875eb866cde722d127c29f5bd878f5775cc331cdb2d3415bb870e72549eb334ef90e340ee2c63d454271a718543a944dac2856d268e868701adcae8d5dd3d75bb376a3ab609ee97314806c51b4a61354a092979a78c10cbff76c6e80ee4ba2d22705ef33ddf2a4da5d952eec68f9afbf44bf2e5786cd0d8a8acfee1b112a1519519fbc7de8327ffe80279cda05786cce6ec0b67ee45570d60a75ac21eca8cb771605888e98fbf9303a80303fa57323a732ca5dd71a0a4d0b840dbb7ba0df1041ed842c66f5a67fde8ef40499dde6694a99b8994c732f21c569bb7ac78ec5d9f0998a0154573cd9531f81819b4b2183824cb1e0fefb494cb9812c9682ac3ce69c97a6ae6fa60ab8c1dc3a5edee40f3e34480e0b0223ec16ffd2b44325664c424187dba29f8bf6462ef5b34ff164c481a50b3951ae1ddf9ac0d6b179b0f4cf56daf369eee75135748db910b036cf6ef1ac613a491a43f03364c66775e814e1b643924630dff5fbb61f4b1c6347ebf73bdb800c509a1271556622e8ed7b11d280c6712fcc9f04f5d95b80ae2ab1864a264e090b66fe446136f8b5833398f10df7e8f638bbcaabfe7e1bf0850b40420b1312b760a36a66476ee70b556f8b90b9c7b084a2e5222b24c312c1afbac912c84f6c94c109fdb6c3177eeb4716b972af1532b3d65e4bc70aabd6c91b0421613b10943e8d6ce849fa7b65dadfe2f7a94676d306b0917108626d00ab112e1fe4aacdaa717d53a5cd30fd961cbd5376580a639615a2ea94cd835ad03517a904b00299185ed6c28eaecfa2ae12254aa7f61bd23fbf0f9b84f1e39027d1033fff5dac8accd699bdb53b5c56ee5db806c0721c72780a19a0170266c25a2766c34e6009581307c314e2b237576e903342ad331f4535eab51b32604fb698d7c90042b6a5202deec80234876d66f3382e3b88855da6dac5adb7c79c2ed54a7821d5e73e0462987a8dd3338cb8be76875f06f98be5de3a17a694815d0a21cb7d3942d8853f780c6fb3fa6cef38af4de1b0cbccf427e1a00c513ff22f36c198a588211c31df7d84f26a5443a037e0b64b753cf0ca2cb3279ac71b05e3432ab6e50b1f876acdeda89d6487ab7b566ef20e678dce", 0x2000, &(0x7f0000004e80)={&(0x7f00000020c0)={0x50, 0x0, 0x9, {0x7, 0x26, 0x0, 0x10, 0x65, 0x5, 0x8, 0x8}}, &(0x7f0000002140)={0x18, 0x0, 0x2, {0x6}}, &(0x7f0000002200)={0x18, 0x0, 0x8, {0x7fffffff}}, &(0x7f0000002240)={0x18, 0xfffffffffffffffe, 0x100000001}, &(0x7f0000002280)={0x18, 0x0, 0x8b, {0x5}}, &(0x7f00000022c0)={0x28, 0x0, 0x100000001, {{0x9, 0xffffffffffffffd0, 0x1}}}, &(0x7f0000002300)={0x60, 0xfffffffffffffff5, 0x1000, {{0x401, 0x2, 0x5, 0x8, 0xffffffff, 0x3, 0x80, 0x7}}}, &(0x7f0000002380)={0x18, 0x0, 0x8000, {0x5}}, &(0x7f00000023c0)={0x11, 0x0, 0x75, {'\x00'}}, &(0x7f0000002400)={0x20, 0x0, 0x9, {0x0, 0x1b}}, &(0x7f0000002440)={0x78, 0x0, 0x6, {0x7, 0x7, 0x0, {0x4, 0x1, 0xffffffff, 0x8000000000000001, 0x8, 0x8000000000000000, 0x1, 0x7, 0x8000, 0x4ddad82438fb57ef, 0xff, 0xee00, r2, 0x4, 0xb9e8}}}, &(0x7f0000002580)={0x90, 0x0, 0xffffffffffffffff, {0x0, 0x2, 0x30000, 0x4, 0x8, 0x9, {0x5, 0x0, 0x7d, 0x101, 0x8, 0x80000001, 0x5, 0x1, 0xffff, 0x1000, 0x0, r3, r6, 0x7fffffff, 0x91c8}}}, &(0x7f0000002640)={0x70, 0x0, 0x0, [{0x5, 0xbd, 0x14, 0x7, 'security.capability\x00'}, {0x2, 0x6f, 0x14, 0x640, 'security.capability\x00'}]}, &(0x7f0000004780)={0x540, 0x0, 0xa1, [{{0x1, 0x2, 0xffffffffffffffff, 0xfff, 0x6, 0x80, {0x5, 0x5, 0x7ff, 0xffff, 0xe0, 0x1, 0x0, 0x99a, 0x101, 0xa000, 0x0, 0xffffffffffffffff, r7, 0x757, 0x200}}, {0x2, 0x0, 0x14, 0xfffeffff, 'security.capability\x00'}}, {{0x6, 0x1, 0x3f, 0x3, 0x5, 0x40, {0x5, 0x101, 0xfffffffffffffff8, 0x7, 0x6, 0x5, 0xa8000000, 0x6, 0x664, 0x1000, 0x1, r9, 0xee01, 0x7, 0x9}}, {0x1, 0x8, 0x1, 0x8, '\xbb'}}, {{0x2, 0x0, 0x8, 0xca, 0x4, 0x7, {0x0, 0xa1, 0x2, 0x80, 0x10000, 0x9, 0x4, 0x3, 0x1, 0x2000, 0x4, r11, r12, 0x60, 0x3}}, {0x0, 0x0, 0x0, 0x3}}, {{0x1, 0x2, 0x8, 0x6f, 0x10000, 0x7fffffff, {0x0, 0x6, 0x8, 0x20, 0x6, 0x500000, 0x2bf, 0xeb, 0x20, 0x6000, 0x723, r13, r14, 0xe72e, 0x3ff}}, {0x1, 0x0, 0x1, 0xffffffff, '#'}}, {{0x4, 0x3, 0x0, 0x4, 0x8, 0x481b, {0x2, 0x5, 0x6, 0x2, 0x1, 0x3f, 0x80000000, 0x7fff, 0x1, 0x0, 0x7, 0xee00, r15, 0x9, 0x400}}, {0x0, 0x9, 0x14, 0x747, 'security.capability\x00'}}, {{0x6, 0x400, 0x9, 0x9, 0x0, 0x9, {0x2, 0x8000, 0x8, 0x7fff, 0x2, 0x8, 0x3, 0x9, 0x9, 0x1000, 0x4, 0xffffffffffffffff, r18, 0x48eed541, 0xa778}}, {0x3, 0xffffffff00000001, 0x14, 0x0, 'security.capability\x00'}}, {{0x3, 0x2, 0x4, 0x5, 0x1, 0x0, {0x3, 0x101, 0x40c6, 0x6, 0x100, 0x5, 0x0, 0xfffff786, 0x1, 0xa000, 0x1, 0x0, 0xffffffffffffffff, 0x7, 0x6}}, {0x4, 0x7f, 0x14, 0x6, 'security.capability\x00'}}, {{0x3, 0x1, 0xb9, 0x5, 0x7fffffff, 0x9, {0x1, 0x1f, 0x0, 0x8001, 0x800, 0x7fffffff, 0x7fffffff, 0xff, 0x6, 0x1000, 0x4, r19, 0x0, 0x619, 0x800}}, {0x3, 0x260b, 0x0, 0x8}}]}, &(0x7f0000004d80)={0xa0, 0x0, 0x0, {{0x5, 0x1, 0x8000000000000000, 0x7, 0x6c77, 0x8, {0x6, 0x9, 0x7, 0x8, 0x7, 0x9, 0x800, 0x6, 0x7, 0x9000, 0x3ff80, r20, 0x0, 0x20, 0x80000001}}, {0x0, 0x1}}}, &(0x7f0000004e40)={0x20, 0x0, 0xfffffffffffffc00, {0xae, 0x4, 0x0, 0xe43}}}) (async, rerun: 32) r21 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (rerun: 32) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r21, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000040)='./file0\x00', 0x82200, 0x27) 21:36:56 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) getresuid(&(0x7f00000024c0)=0x0, &(0x7f0000002500), &(0x7f0000002540)) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = getgid() r8 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r9 = getuid() r10 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) read$FUSE(0xffffffffffffffff, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r13 = getuid() r14 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004740)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0\x00'}) r16 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r17 = getuid() r18 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r17, @ANYBLOB=',group_id=', @ANYRESDEC=r18]) r19 = geteuid() getresuid(&(0x7f0000004cc0), &(0x7f0000004d00)=0x0, &(0x7f0000004d40)) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000000c0)="58e7f223ac3766883500e0c3a3155c70c07f7e78f5272cba973ace91ec06c250402a4e822a5af567287273f9e10d877a9670f14b9f30bba7b0ed4354d11449a850f7c5a08cd00b3cd77d71c25e00aedf91ee834d1487398100f5c0bee538e69be8ab27b32a6e85636aed3f301a129a7b8f82c22a92818fe81371fae56292a88105a61a4df50eb7a1d5949c9ce05d70039da6311418292b7c1ded51f614cb76ef483af938f8aae37359dafd71bba154e7aca41f019198f4cfbc0b5dc9a7e7b16d8355f2607781c69ee3ed9d637ba6690c76d7178a85b0297cc3072fe0a050551f3b89f806f99e04d25b6cce77c324ec6602c7e1cb323419a2eede008fb9b6735b1da87a1b812d25cadfb89bc450c9cfbb9084e65ce041ba3925c1375ce11980cdf95ecd267542e6754ab3e208ab92c87e57d81bca8b82ab4b8482f5b48fa450e6b1ee02a373aa98211b076ebe5403d12ad9cce5eb7b659e9df67705a784a8a730f2a1aaf0af90a3896920d6bc09658cfeaa6c4dafc58a8048a35718aa7067be288b35ec08a51d72f5680b7b6d1d538ba4df24470c4febd151f90ae4b919a7a2329d876f8fb636be51a24cb98f598752f757a7c06308e4912e89f97aef687c257a1f524e48b7a94225d9ae133867a73e1be6fc8e1f1cd7fbef66e85564f95691092591cf3492fcc2cf9d82e24e5728da9f4aa0217fd6bcd56e63c92cf15f45870bde3092cd1a984f779164f44ebaaca94103db6acf657cbc1c9ca56248cb871699aed2adeaf4d2383fbdc414b4638bbff2a01ec74423cb802860a1cea3ff8950805f0153ee1c719ecacb44bba2c8a78a99fe45982cb36721ac91c5b12a38ba432912cbef9122e2eed39dd63aa9bce11867af701aa018dc4a3ac337b2c3c3cbb5cd29f8ef770abaf1a9ba1651f9b8f8e154987c818c3960c423e2ac5f4c8267fbdb9ba5c4d3dc5a27a8cf6acc43bac886342020d58316f0b7bf46620a9fc740223aa27f5aead28d48fb1bc929950103f8b5fce17ce1c946915696d39376ca0f2943c2014a832dd378d183038536c2695a2faf57a5e85ebe79e0bdef78f71acd1722da43d81929b9302e48613ae893b42c34b0fe3123660f670c83ef2d9b366c192c96f63be1512b1aa00a3909deee35948d71c55c329a1d4efb46eda5b504b8abfa7c9825c0e3289edb942f1891c7ecf0524841cd862336148da8ccd375583b03a74178611a5ad93200652c8902f40876d3aef928d0d2dd1c1494d5321cc23daf11c57d978fe3fe5194eea53f5d558b4a0da644c37afab505762bb0cae09d08de93429a1ff436d182e02b516ab34f5392d4a7809140397af81d1fd41250eb61f878d5cb118414b97921df1d1f1304543ecda6f02e1f7553d5eb5333739afcbf2b83ebe8ea22fe3c3bfa611141b1c955b309680a0d996ffe2572db68bc9ede659bf7b61ee65c1e1d0f1b2c767ed27e6dc56fca9ba6e1febbe8ba27c350a365b82e4b86fe47e8cda83440ba962795437487ff29251557b94c1a8188609e0235803fb91e41faef2f5dedec7e293cfcdedf58f59b9e17fb7db89602a4c12077d64ff7cf82da0ee71e73ada6f19c1a8d21027d0682ab47c69616f6cea6c875558a0aa224a65be31ca30b1cd9d9a98996a881304f308cc1bb5a6326b235bc493fe6a60caa0ff933dfec9880d1bae752938828a1ddd8dbc7d35b577d13a6dc7ba36e927ca4a09711b422284d96f45a7dcf3204c9a8e9ef6b29615ff43c5891e1e2dfba2268c6956839da66fc9002a42d2c92de14c4006c752382c3601ea7c05ec418c4304fae2cdee9f496a6f4dda7ac77666499bc178ba2fd4cd6dc567e37154612a1a767ee2485786f47b60383515852a65d6e2b2d03df112f5effca144e0cf1a46cb84a0173a9422b321e9e840d96606c8fb0ee11c42959aea83daadbf72056caf502323874b741b5ade7df63dfaab32b0383a7cdb4fe75f6857f30951f3750fa3a2e14fdbe8d99f1b0b60007afa6648b1e9813ea038e7e39f20763c67f5e8e4e537cace8554da5e3f93ebbe14e4d112bd6f854ebdc7f57150025289d8e5cabce8bd0e3563af621ac8d58e33f2fdf6fabe4662b9ec867e4923e3de26b27773f0ce1168e25807e4f27b2f4e2e297ee366d2ac8c8ad891062efe0dd2740cd85cb347171575f1f61abf405a48b701174ad17aa98d8cf3f6d1864edb4c6c9eff897d95fdd6f872810b7b6c6f7bb749d4b1a9b516e4e581d44fbcb44330a37f7ec5512d1e059141725de4d6b5960dc56ffd547587520550e0d184151a4f90741ac75c60886660df8214776bdc46a215ac99ec48f65cccddf55b6fc9d680fa2b4820f6c5a4e0aa6149ccb1d2ac539c7bcb47ac5813a5839121647e60c313f60a5b2dbe5cad8b654e5f2bddc26de868c027b3d6da749174a0051ca5e79fbe37d02c5246023a57b2efac49ecac3a717c4b71c7dad4c92538f9e008c38a35cfeabb585697a4e090c8781e40bf0ae18178cf4bd1fc13c31461be73bd9b24e652a9e2bd7d4dc79d5d7c2e169fcfa6fb1970f93600df3d64f4a3327f3bc0272184a68ecb5e240944f396fe1f48f41b183a92147bf2a9ca207c65ff3517116ab024f4d557f2bd5bdb935e4c0561e61c7d535af65237f342796e1c6893ba8a1ae8900213a1a189978a8244d33f802afe74682a1b3b813d960c49df2b0f56e1d531442a137a0db406cf753f15357c4feb3a1eb60fa06286cdb857c0d8526cc2a1df5d988d3ae59e77ecc3ccbe355417904aab54cf7061e6a95b8ea7b7e3ea0661ad1b97dad5946326fd9828c0241067845585ec327b5f127e3cb732f2c6fba2349f33c36fc0816b8dc608f111c37f23cefa363ae521a10871261f40f15001efdf812de96eb830c723de9199b688c1ed3f10a4678ec3c02abd5cdc1b442387efd20974e256b3f2f99c4baa5842949a04a5b55587a475b61c7a6bfee02d7c686ce7e94efd09887cc0cb2312d46de4279240b8de4e73b8bec559d8567bef52245fe3eef1603353058f0a57ef50127342fad4639fa1295e731c332507764ba4b5cef64ae0f71994b9272b7cf4bc60367ac34140f88dfed523c2dafbb5070354e220931bed8e24d5019fa4d34999333647337837dd13088a9f5b15c9f214ad9fb96931efdb2f6f96ccc27f1fcc6e29dc5b55e2b84f214474c1dd6973ca761e2b93ea4e054fb134536224b76ed7188ccf78de5e983bbf9ea77ce98f33499a227631dfe6e2e0409602effdb60c9b6d902d3dc45dc7e9fe11228f0b3bc553319ec32ea98ced587493e109c255150fcbb78e00242a4375c0541e8ec7c2b17494385b58143a65a010dffb0d6afd0b34770e7e2b735e69620e38eb748083df84c1482b8f4c88a352c10be1068662b75484827f11db4afd6fea96442242f3ff0b11cf4e437a2c690a2e6c77828c5136cbf59584a8d0e720ed05731c4e7357a7d2f3e17757e5736645cdd5e1827f9e6e49f10c654b0eadf676d3e06cc8440902efb22cedc0522c0849f0c4aa0426d5a80ed5543dbab7ed9a09f65af0c462ceb8eef76d80be309726d2629b4238c8aceeb2dfbb8a6b7f245cbb5f61a6ea2fdd0f2fbf7ae9822aadbc30c8ea8435e4c642fff7df769dd21a9247bfb107f9995944a453418a33af61696fb4c3b585b608d3ee1365bf3ab30f12d98aefe2f3880f0c480292b33034c36e16d580d57a1c8dcbb28657a77f271e70a0853271038e910c4c35d7005e0af47c52c0c669a2a86f25693b4a0a08be5d2d1ad184cc1bc3e34ec2a8a80a6ee3e4cfdfc6ae893dce8e9e574db65952e92f81e0ae941283fce85016e9720de180ba261df69defdd09966a7c40d81919a89e41b4c98694b6ec57f4ea294320c53efdaf56aa26e5ebc2abe862f2256fe894b5bba9635f47b6475bdd2e4a8a09fca0f2de81238b1417efdfc3754f3dd843ff818fb4d137cf1503b451e5b634adbb0e8b01eae02463368f0326a852f5b22cfa528adf394379df5bbec867ad9788dfcfb1f5c1b7468dda78a915a2ce2face01667b08aa4398592ef39c359fc3ef99978b84ec40dee5217bae6e624c4c21b919ecd0f1da58d0dcef94fc765d50c99876619feb14698227ec98b2c79ec5314c4bbc2de6a73e34574ee7db257080e78b3959ba5a1aeb29e9e60d8f30a8a26a83e89375a8033d53d50f08ff3228fa90e7d8d5ecf92b0a9a18d80f82cc725679d714ffa1c3456d2027060e91b2bb46c5755924bf102b0aa9d2b1993bc897ca8650c103c5d89fcee5928dfc1a70a224068da04fdcfea05ead1c4178e17d2b3df22dad3c1dfd4044fc9876f87b2c766c685cdb765c75d8ac2ba3ea371fe52e22b8fbc5904f1e5cb5cecb74f91e2d8c540b61449029c8b93d357a0b4f3cd9dbbdb4230cd59cbec1ca81ae0a921981d005edddd774d3a1325f6625e3fcdeca30576aa78cdd573ae25b4c871f4ba06a59fbe54364f4afdc80839b2e2854c4fcf355baa6b920851be724e91bbc80e3f8fbb6696b4361522933e29690b8db25bc5ccb7392bb2a875308191b616ad7d1105ad4d56ed01e74e3011195f49eecc32898a3718358c0e0f54d531bd201e9d4452ae25c59865cc4ced0ac084badf86525675ce7515b2cf56c2978cb6510e58565521871758e0d00c1428862c17a77e28f4b08b93520996ee7e7e287edebc77a50144c1c0b39509efc661e41cd31dda04039f7fe02e6c091a90e41f799696a85c27a612e0bea9f85b9c0cb138bf6337f4d4fe25295ada04bc0fdadb999f0c92120817b5c7e3339beaff6730cffac06ca6d74ae892dd5f06f21b5ae50b760281a392e7b331a8f3cfc053d298eb47751b52699b41db4e98ca1a270b82091e915da3ed56be3b6a2d97ca1904f0290a54dda0fdaf5856ad1be6afd6ccc3cc5835410c47f4c650b1e4017c831ed3a9610d8391e5c7b8def5aa00f4f3bd1ed85899b622178613be8e5f8abf45fcf7a076bb4b0720b5b2fa716b4436b0c05045632881ed5a54fe721ab15860f585261b273a0162d08bd9b5a0804b604ff965d72ca7aa90a89dcf0920a0c929af181fb5ffd6d93eca68e23300adb14e36a874647dbc3905b87ff6c5827a5d1bdb4b714a933a5321d8d00b1ef0eaf782588a65da18810a322715670f3e5899eec1fabcafa12d2474d5e74a90abb5137fff3f30b83f8273340dadc0b65a3326547cde0523bee800e495be676f9abdf5a59ba0bf502ae967f427ba515624413545be0a5322ce025eeb5fb8a8fef8c3f973e6c11fe0c23becfab14c8d35ddea55f9d5cd3f11fc2611f411ce9f3f1e9757afa237d755ae2b143921a41bff1e30a7c8fd2d70016da4d9755763208f5096a13921949ea36884eacac2974c6720869dd764ea395bc3258447aa019e2a34c32698f2973b3cb8945b07002de2b6b787ce7b815958afc5e8da241aefb604952eb02e0ed0d54fc48d2b3becf02e7aa8ccfa9e49072d3f34040e9f7b86e50c7851d12fa357f1d258eb80b8535fe7540fc0f71bbaeea68d8186aa0ef2b2b8b908c537085cea698b5c18c235b997a80e35b5a4e9d1e35c03d6199676c37d9dff12535db7389c57abca5744388aa8af2609930991b24ce97eb352de3cf25ce3ac30290d35209993f23f5024670315808c3284bee8eb17811aa13ed2c43599ef5a94d4ec7144bad8a5148dd9b4dbc4f04832ee57ab724b132edac98d7dc4737f6a87e85aced47f368e92bb48b6dc159e9aace860ba4e11bd99084625e87a2afdf983172664a428a691811421cc4c6062500e364fa9a7d6409c4a4c2640dec8fcd850c88cb238a031a1397c1ae1ba3e9e44541fde062b06814bfb1f944bf19feaafe5ecf3bb6e994c9057c5e158f47a090fbdd0b2d6a4c973290c5a5e61342d1597d44b31470510c5c3252c27529cc1bbd969d1fed6207ca0696225579caeabdab8bbe6f3eb825647c9c01f1f4ee6ca4310697f7f38f2b9e6ead62d891d0885c790010115621c1827020fcd94f552596c11f4ca07cf2fdd39352f63c50a4e5db63c414604ae181bdfc0ad2462e0720650399dbb39695f59ee879d25626f7343349af62893f35c319b4e0832bda52815d993bbbd3e18d937a1f490f196a87f8514976e965c577b5e027fd4e540e734f750cbe3e910fc31d33aa2b7a308439adbaf80e765d5e1d17f3beeb75e7557e4fac81b09089189efb8a19f4602f16254eabdeedb05590f9ab9a9f9c0e5da56e33e071b2673c468a597f50fb5dc0d8b6a82a43dc2e469b56dd0062bbd67616e8f16d3dd1fa2c6b2906dc08bbc0f50324242d640f81a000db6f5bc64f68d61348ccd267385a6854ce2bf858bcdceae9ad5dbd6cb623a9f1280f48c3fd666d5dc7cffe9c761082cd040c295b888b9cc97b80b0264e73bc264b99968855df1998ea1f65bfbe1e62fd681642fa5da33ab266e0ff5629cfb726205a705b8dee15ded1812694e2e0fba563045a05ea0d67faff21bc209ccb8f25ea26d39e154c568a9cdf001472c1d7f477f0c78b3beb7a976811451e590c05a65b70a885f308167e4189b23d27f4f11583cf49e06a834cc49cb54555ff363c776091647444a9eb9cd87f3855ac74bcf97215852b24ff6ce4471e1379a325ce868815c298613e7a859fbdce2a264028e118bae7c4077e3a830378bff3495ac650f52c20ef9f7c6e10a60d0872a60d6102b043831b7748ad952d4776d0c607961e3d63f5fed41bf279304dedb94ac250133ebf42d989a34c809f98287ce02924f31f10695cae4a00c596963e46c46e601f2e15a02dabab59e382a7caf07e2e5c1b23cc93defc4e98281f0a1106ee20c24751bec91dbd6680e5672dfa27a5f4371d67e6747b01c35dbd2096e2dc6c3c478223bdba2594529cfa6f7843c529d20cb97634edd15d811982b7cd14dffa0ca29a9bfa5822574a2f0db274d262a0b13426d89d832a64965e9f46f94f8011d317ca0adbb0ae835e1373942ac8ae3f123934af523d8279780edf34bd2ad1b7343591a4bcbfed1292c2b4335ab5dda1849f46f80c78d23aeed3b8d2aff97083d272644b80461550ce93945f51ecf623fb9d5bad4be22029d5ed1cc80db92937024e2077bcb4f05c95f3a9225a91cae7915da7f13e22feafffb935720dd5fa760d954ef9fb18241ca34e24eac3fb4dc8646e3c8e89dbef9581bea1b0540f034be6822b471b2450bbe6374586dc77c82a9711eb579a81c7842ac447b565ca713727c13b299041fc069d8dd83ed1bc314f2963921cba460f05adea871ad53702e48ccf74d0b82f4b7497337f62b7243eaeb133c3f50b55e6106c29008fd908b4429c56972a33a26e37cc915ec00219eb4ba0f801f0de79c6fad9e9b053953f3a701706b12576dd786df40f76f07adb84debdda91024c42b3f62911033de597dcd29299231542ece35687b3706e1804f9a6c049d3f5b0f48abe3c6b6c1397a7996adff50f703276072095ba353adc865c4f0688d7353a55152ed61a9366f185b70b10727661d803297ce983bcad31001e543c5d8b7b1aebb8a18bb4f532f335a15b29671e7f12a453384316ebe92725d50ae105c08e3c19f96bad6068937495c18a7bab50ab99730b6ad0ab64e0dee1ab9b5c1be14c92ecef470663236f7c17819fb04891a7bce7f1ba5e906d2ee5c6b53041a8f24164972b990dc0538974be125e71f98581bf29134d9152902e8a00aea879b9bd7e9faea3329589b1f4a3df862893231bbfaa040d1897d45828965b680c7cd17ce612483af98676c7440559d5908158768b5a6e99fd2636c4771047388d06b872c0996c5179b526f969bd9815ccbd8a54aea65e77e9d2afff96db45e6aca413a562aeb5ef7f2e75eff264ae3d9184982c94f52867a8f18b4dee1cce263cab566b83daab3e1850a1556ca7a183f1c7a1a90bc12f3b86341f13471fea589df98414696232cd29265fdff9a3505dd859027d7d422c768e5f5682c3243f7d52e8229d8fce97220a23051d71b5d858b830aa14dc65b70993962b4de66bcadfe60eecd71b83ac7d73790041c23ee8119cb36cef0e66b45212d152462f013ce8a9705d50200386ad3e11d808f6f8fb38d56ab5e34ec09cb541bf6ec782b1d52faf8b253fd606b909bb031fef2e5f983ff5dcf1a135155dbdd22d06d87e68430887c4444d82e1417f062626c59d80c48ad4e49ee3a66207a41d0b14e7fc83a8e4b6c5bf7a32286c5951d2830295d515b5feb255381b3f2722e48fa46569cee88cfb6b159a79d6a81e91b9f4c83386f8a0b8d5ce6bad6fbd02c5ccc00f6e71a048433b9b9659ff4bed77f1a132aaeeb955389308f547e0695263e35b99bb7f009f63613037b7d2585b4da8f3bd7349dc4a8dc45f847592f8140c8de0b34f71d42d9516bb252ec71d5894478b5e401c0c25094d2c6ce9c0d7e4c08965ea68e714f3f3a174fb2b285f2000723ae6bbc5c2c76455c008ea930ef17ee975b8e6d8a49694f14b01763bafe3bca4e2dd449a3274dff81dcdfcbdf874674c704dd4f415c9809dcf3306cc41f7ca9280904d3d7aa2798049c60dabf48e1058b7554f9e2e6d048ea11c835506393aa7bc088bdb09d177d9e17f24363684f1262bab99f13e2232cf2f3b4b637a20a95b56e86bc2a3790d53e1a0f4e86fa645c77d6cd87bbe86a671488e041ac137b7ecc529cd07866c06cd90493db87735c026f1370ef0d565f94c386ba4fdcfe881d8d24efe69bd9124fb8ec42ddf3a014dd8f6e1d9426f18f6e330e25e21d01064aee34c5af1f4c6f536bfc7e65e03a38db35bd27d2b75aa1e8e6296ce1b8e000a1f695e8db945ec4cf51ef13d589eee7f57f5fd0bfa4215b087f24fd681b619148407e66ebf305cc73f0528662e44437ae7f2c9480e7a1883cccf3951a83a6bed688d338cbd05b17ded8ddd99ba1f53c91dd9b09189252413d7d169c99359329fe961ad4e4bd604d8b971efdc1f0a48f8a86f3fba600ab95c9d19b786de40f1871015590b313033fe23716451a9204d4eaf33d551afca2b3e52a16382366776cc6b8d1bed9d05926b4455eef10cbfdf42cbd3c2ac76eb3d32c548c271a912c8074329870d24a6d4174f8554abcb20b477253e3c1ce7f6b9fd3995079ad6fecbba41a02967d2e228eec44fdd521c2396dd24bd51bdfa39380190cd19c6324c7a952fe606c13680ae3e2783aa76386ef1e466b924de8e59a84e7c2dd5c496b4eb9672146946e745cfda0f0b68e2ce95c2a6f537565742edc573836534f08387d88b054633e655348465af39b8f9288cfbf55352f61ba0b0f852f1e8b806f9db20c60403947553518a7ad3e0bbfdd884d81c14a24885f2e26bf524bbe82b8c03c6eddb86b3daecd5eab17a6a15747e52a83ef85eea4e20fbb1d1cd57773193a1ebe0cf3f8112cb5244ac8818ae0f77c478cf84c1ddb91c0b0a210c61d843f845fa86ffd45f9eb647631713456cf9a82e03ee33efc2784b46d9a3478bd0b826ecc90fce0eaafebf61040cdfda8af00a7c439338ae79a42559899a365354f81454db82a34e8b5844673f0691da0bd13d680ca18766f5f6969c79fa779328a74621efcab7b4b88e9c207da4dc415ab5fe9701c38c54edabb6003bb30af26a89b3dffa708a4292484c08e3fc324a4c92f327148ce6d8c45e5c005312c84608d48729971b5eb2e0af608dfdee70e22511a4e75a77bb010e8eb86801116c22b73db4f1995c23fb1007b54fa9abfb4c21166fcf7daedfa5cfc2550558b781b4bcbeafe94010cc2ceaa753d1799e5eabf03250e76a08b980d00a38f0651c7df2e24269a9636130310f298f21e3c393fc3ef74d403ea2f63f8ec0a86fa40031cacb4a3a99b514048cfaf3a97f45fc15acdd7ad9733a7943a35f5ac9eb9f56ae435cc0588049af21539c16aab8c4cef0254560b8f397a75565fb01448299054e544cb4e3067050ca0e74199d6ab4c97fcb3ef3c7fa991509f3d09f84551db639e4db30b3ca524364b6bbc08edfee0002e84587ad49bd1f2edc008d81850a73ca4b107fdf6ebd4472ec99fade0a3f7a9572bc4043790efdd483906e0808db7a1b46a6bcc5907ecd8c2448f6d38842111dd40586d376988f947a5353f57bc22c10303da59d475b83f4128b24f6d96b08f039ade54aabde9362c2478b574c246a8617b2ea0d70ad6f0c4ef5245bc26a38fc39efbac741c6780378b6020bfb17077f7b28cafa132d1a28aa197b9593211e6b473f499de2d8ae72eeda1bef5a5013538cdd701bc4530ab9c4b62bac0e97276f5c53d384d04fcd70fe0cb822b4d9d12fc8683da6b27a977bb503b148a799ad4abb4ef4e2e7f5a33f8c87c060760efb54508464df900a6724b3f290018961fd91c4d4e6acf65d8af2dd5ae1191779255357e059db88cb606dba3545f5c08b9c4dd51d4ee7eb0f44ab67e330975804b60dbd1903613343c5b18d112c8e85acb8bb75fba553c7540b217ad0fff60f3b4c03875eb866cde722d127c29f5bd878f5775cc331cdb2d3415bb870e72549eb334ef90e340ee2c63d454271a718543a944dac2856d268e868701adcae8d5dd3d75bb376a3ab609ee97314806c51b4a61354a092979a78c10cbff76c6e80ee4ba2d22705ef33ddf2a4da5d952eec68f9afbf44bf2e5786cd0d8a8acfee1b112a1519519fbc7de8327ffe80279cda05786cce6ec0b67ee45570d60a75ac21eca8cb771605888e98fbf9303a80303fa57323a732ca5dd71a0a4d0b840dbb7ba0df1041ed842c66f5a67fde8ef40499dde6694a99b8994c732f21c569bb7ac78ec5d9f0998a0154573cd9531f81819b4b2183824cb1e0fefb494cb9812c9682ac3ce69c97a6ae6fa60ab8c1dc3a5edee40f3e34480e0b0223ec16ffd2b44325664c424187dba29f8bf6462ef5b34ff164c481a50b3951ae1ddf9ac0d6b179b0f4cf56daf369eee75135748db910b036cf6ef1ac613a491a43f03364c66775e814e1b643924630dff5fbb61f4b1c6347ebf73bdb800c509a1271556622e8ed7b11d280c6712fcc9f04f5d95b80ae2ab1864a264e090b66fe446136f8b5833398f10df7e8f638bbcaabfe7e1bf0850b40420b1312b760a36a66476ee70b556f8b90b9c7b084a2e5222b24c312c1afbac912c84f6c94c109fdb6c3177eeb4716b972af1532b3d65e4bc70aabd6c91b0421613b10943e8d6ce849fa7b65dadfe2f7a94676d306b0917108626d00ab112e1fe4aacdaa717d53a5cd30fd961cbd5376580a639615a2ea94cd835ad03517a904b00299185ed6c28eaecfa2ae12254aa7f61bd23fbf0f9b84f1e39027d1033fff5dac8accd699bdb53b5c56ee5db806c0721c72780a19a0170266c25a2766c34e6009581307c314e2b237576e903342ad331f4535eab51b32604fb698d7c90042b6a5202deec80234876d66f3382e3b88855da6dac5adb7c79c2ed54a7821d5e73e0462987a8dd3338cb8be76875f06f98be5de3a17a694815d0a21cb7d3942d8853f780c6fb3fa6cef38af4de1b0cbccf427e1a00c513ff22f36c198a588211c31df7d84f26a5443a037e0b64b753cf0ca2cb3279ac71b05e3432ab6e50b1f876acdeda89d6487ab7b566ef20e678dce", 0x2000, &(0x7f0000004e80)={&(0x7f00000020c0)={0x50, 0x0, 0x9, {0x7, 0x26, 0x0, 0x10, 0x65, 0x5, 0x8, 0x8}}, &(0x7f0000002140)={0x18, 0x0, 0x2, {0x6}}, &(0x7f0000002200)={0x18, 0x0, 0x8, {0x7fffffff}}, &(0x7f0000002240)={0x18, 0xfffffffffffffffe, 0x100000001}, &(0x7f0000002280)={0x18, 0x0, 0x8b, {0x5}}, &(0x7f00000022c0)={0x28, 0x0, 0x100000001, {{0x9, 0xffffffffffffffd0, 0x1}}}, &(0x7f0000002300)={0x60, 0xfffffffffffffff5, 0x1000, {{0x401, 0x2, 0x5, 0x8, 0xffffffff, 0x3, 0x80, 0x7}}}, &(0x7f0000002380)={0x18, 0x0, 0x8000, {0x5}}, &(0x7f00000023c0)={0x11, 0x0, 0x75, {'\x00'}}, &(0x7f0000002400)={0x20, 0x0, 0x9, {0x0, 0x1b}}, &(0x7f0000002440)={0x78, 0x0, 0x6, {0x7, 0x7, 0x0, {0x4, 0x1, 0xffffffff, 0x8000000000000001, 0x8, 0x8000000000000000, 0x1, 0x7, 0x8000, 0x4ddad82438fb57ef, 0xff, 0xee00, r2, 0x4, 0xb9e8}}}, &(0x7f0000002580)={0x90, 0x0, 0xffffffffffffffff, {0x0, 0x2, 0x30000, 0x4, 0x8, 0x9, {0x5, 0x0, 0x7d, 0x101, 0x8, 0x80000001, 0x5, 0x1, 0xffff, 0x1000, 0x0, r3, r6, 0x7fffffff, 0x91c8}}}, &(0x7f0000002640)={0x70, 0x0, 0x0, [{0x5, 0xbd, 0x14, 0x7, 'security.capability\x00'}, {0x2, 0x6f, 0x14, 0x640, 'security.capability\x00'}]}, &(0x7f0000004780)={0x540, 0x0, 0xa1, [{{0x1, 0x2, 0xffffffffffffffff, 0xfff, 0x6, 0x80, {0x5, 0x5, 0x7ff, 0xffff, 0xe0, 0x1, 0x0, 0x99a, 0x101, 0xa000, 0x0, 0xffffffffffffffff, r7, 0x757, 0x200}}, {0x2, 0x0, 0x14, 0xfffeffff, 'security.capability\x00'}}, {{0x6, 0x1, 0x3f, 0x3, 0x5, 0x40, {0x5, 0x101, 0xfffffffffffffff8, 0x7, 0x6, 0x5, 0xa8000000, 0x6, 0x664, 0x1000, 0x1, r9, 0xee01, 0x7, 0x9}}, {0x1, 0x8, 0x1, 0x8, '\xbb'}}, {{0x2, 0x0, 0x8, 0xca, 0x4, 0x7, {0x0, 0xa1, 0x2, 0x80, 0x10000, 0x9, 0x4, 0x3, 0x1, 0x2000, 0x4, r11, r12, 0x60, 0x3}}, {0x0, 0x0, 0x0, 0x3}}, {{0x1, 0x2, 0x8, 0x6f, 0x10000, 0x7fffffff, {0x0, 0x6, 0x8, 0x20, 0x6, 0x500000, 0x2bf, 0xeb, 0x20, 0x6000, 0x723, r13, r14, 0xe72e, 0x3ff}}, {0x1, 0x0, 0x1, 0xffffffff, '#'}}, {{0x4, 0x3, 0x0, 0x4, 0x8, 0x481b, {0x2, 0x5, 0x6, 0x2, 0x1, 0x3f, 0x80000000, 0x7fff, 0x1, 0x0, 0x7, 0xee00, r15, 0x9, 0x400}}, {0x0, 0x9, 0x14, 0x747, 'security.capability\x00'}}, {{0x6, 0x400, 0x9, 0x9, 0x0, 0x9, {0x2, 0x8000, 0x8, 0x7fff, 0x2, 0x8, 0x3, 0x9, 0x9, 0x1000, 0x4, 0xffffffffffffffff, r18, 0x48eed541, 0xa778}}, {0x3, 0xffffffff00000001, 0x14, 0x0, 'security.capability\x00'}}, {{0x3, 0x2, 0x4, 0x5, 0x1, 0x0, {0x3, 0x101, 0x40c6, 0x6, 0x100, 0x5, 0x0, 0xfffff786, 0x1, 0xa000, 0x1, 0x0, 0xffffffffffffffff, 0x7, 0x6}}, {0x4, 0x7f, 0x14, 0x6, 'security.capability\x00'}}, {{0x3, 0x1, 0xb9, 0x5, 0x7fffffff, 0x9, {0x1, 0x1f, 0x0, 0x8001, 0x800, 0x7fffffff, 0x7fffffff, 0xff, 0x6, 0x1000, 0x4, r19, 0x0, 0x619, 0x800}}, {0x3, 0x260b, 0x0, 0x8}}]}, &(0x7f0000004d80)={0xa0, 0x0, 0x0, {{0x5, 0x1, 0x8000000000000000, 0x7, 0x6c77, 0x8, {0x6, 0x9, 0x7, 0x8, 0x7, 0x9, 0x800, 0x6, 0x7, 0x9000, 0x3ff80, r20, 0x0, 0x20, 0x80000001}}, {0x0, 0x1}}}, &(0x7f0000004e40)={0x20, 0x0, 0xfffffffffffffc00, {0xae, 0x4, 0x0, 0xe43}}}) r21 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r21, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000040)='./file0\x00', 0x82200, 0x27) 21:36:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0x3, @private1, 0x200}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0xffffffffffffff01, r0, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e22, 0x7, @remote, 0x3ff}}}, 0x38) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:56 executing program 2: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:56 executing program 2: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3003.343414] FAULT_INJECTION: forcing a failure. [ 3003.343414] name failslab, interval 1, probability 0, space 0, times 0 [ 3003.355292] CPU: 0 PID: 27205 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3003.363210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3003.372686] Call Trace: [ 3003.375303] dump_stack+0x1b2/0x281 [ 3003.378955] should_fail.cold+0x10a/0x149 [ 3003.383124] ? mempool_free+0x1d0/0x1d0 [ 3003.387113] should_failslab+0xd6/0x130 21:36:56 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) getresuid(&(0x7f00000024c0)=0x0, &(0x7f0000002500), &(0x7f0000002540)) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) getuid() (async) r5 = getuid() getgid() (async) r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) r7 = getgid() r8 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) getuid() (async) r9 = getuid() r10 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r9, @ANYBLOB=',group_id=', @ANYRESDEC=r10]) read$FUSE(0xffffffffffffffff, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r13 = getuid() r14 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000004740)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0\x00'}) r16 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r17 = getuid() getgid() (async) r18 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r17, @ANYBLOB=',group_id=', @ANYRESDEC=r18]) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r17, @ANYBLOB=',group_id=', @ANYRESDEC=r18]) r19 = geteuid() getresuid(&(0x7f0000004cc0), &(0x7f0000004d00)=0x0, &(0x7f0000004d40)) [ 3003.391110] kmem_cache_alloc+0x40/0x3c0 [ 3003.395195] ? mempool_free+0x1d0/0x1d0 [ 3003.399218] mempool_alloc+0x10e/0x2d0 [ 3003.403126] ? remove_element.isra.0+0x1b0/0x1b0 [ 3003.407895] ? __test_set_page_writeback+0x3eb/0x1000 [ 3003.413188] ? __unlock_page_memcg+0x4f/0x100 [ 3003.417711] bio_alloc_bioset+0x41b/0x830 [ 3003.421880] ? bvec_alloc+0x2d0/0x2d0 [ 3003.425702] ext4_bio_write_page+0x743/0x1160 [ 3003.430318] mpage_submit_page+0x128/0x220 [ 3003.434574] ext4_writepages+0x1cd3/0x32a0 [ 3003.438856] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3003.443653] ? trace_hardirqs_on+0x10/0x10 [ 3003.447911] ? ext4_expand_extra_isize+0x460/0x460 [ 3003.452863] ? __mark_inode_dirty+0x33b/0xf40 [ 3003.457389] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3003.462162] do_writepages+0xc3/0x240 [ 3003.465983] ? page_writeback_cpu_online+0x10/0x10 [ 3003.470930] ? lock_acquire+0x170/0x3f0 [ 3003.474919] ? do_raw_spin_unlock+0x164/0x220 [ 3003.479965] ? _raw_spin_unlock+0x29/0x40 [ 3003.484133] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3003.489433] __filemap_fdatawrite_range+0x236/0x310 [ 3003.494470] ? replace_page_cache_page+0x700/0x700 [ 3003.499432] file_write_and_wait_range+0x86/0xd0 [ 3003.504209] __generic_file_fsync+0x70/0x190 [ 3003.508636] ext4_sync_file+0x8ed/0x12c0 [ 3003.512729] ? ext4_getfsmap+0x8c0/0x8c0 [ 3003.517010] vfs_fsync_range+0x103/0x260 [ 3003.521095] ext4_file_write_iter+0x5fa/0xd20 [ 3003.525609] ? aa_file_perm+0x304/0xab0 [ 3003.529604] ? ext4_file_read_iter+0x330/0x330 [ 3003.534197] ? trace_hardirqs_on+0x10/0x10 [ 3003.538446] ? iov_iter_init+0xa6/0x1c0 [ 3003.542439] __vfs_write+0x44c/0x630 [ 3003.546166] ? kernel_read+0x110/0x110 [ 3003.550072] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3003.555110] vfs_write+0x17f/0x4d0 [ 3003.558683] SyS_write+0xf2/0x210 [ 3003.562132] ? SyS_read+0x210/0x210 [ 3003.565753] ? __do_page_fault+0x159/0xad0 [ 3003.570008] ? do_syscall_64+0x4c/0x640 [ 3003.573975] ? SyS_read+0x210/0x210 [ 3003.577606] do_syscall_64+0x1d5/0x640 [ 3003.581628] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3003.586994] RIP: 0033:0x7f043d3b60f9 syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000000c0)="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", 0x2000, &(0x7f0000004e80)={&(0x7f00000020c0)={0x50, 0x0, 0x9, {0x7, 0x26, 0x0, 0x10, 0x65, 0x5, 0x8, 0x8}}, &(0x7f0000002140)={0x18, 0x0, 0x2, {0x6}}, &(0x7f0000002200)={0x18, 0x0, 0x8, {0x7fffffff}}, &(0x7f0000002240)={0x18, 0xfffffffffffffffe, 0x100000001}, &(0x7f0000002280)={0x18, 0x0, 0x8b, {0x5}}, &(0x7f00000022c0)={0x28, 0x0, 0x100000001, {{0x9, 0xffffffffffffffd0, 0x1}}}, &(0x7f0000002300)={0x60, 0xfffffffffffffff5, 0x1000, {{0x401, 0x2, 0x5, 0x8, 0xffffffff, 0x3, 0x80, 0x7}}}, &(0x7f0000002380)={0x18, 0x0, 0x8000, {0x5}}, &(0x7f00000023c0)={0x11, 0x0, 0x75, {'\x00'}}, &(0x7f0000002400)={0x20, 0x0, 0x9, {0x0, 0x1b}}, &(0x7f0000002440)={0x78, 0x0, 0x6, {0x7, 0x7, 0x0, {0x4, 0x1, 0xffffffff, 0x8000000000000001, 0x8, 0x8000000000000000, 0x1, 0x7, 0x8000, 0x4ddad82438fb57ef, 0xff, 0xee00, r2, 0x4, 0xb9e8}}}, &(0x7f0000002580)={0x90, 0x0, 0xffffffffffffffff, {0x0, 0x2, 0x30000, 0x4, 0x8, 0x9, {0x5, 0x0, 0x7d, 0x101, 0x8, 0x80000001, 0x5, 0x1, 0xffff, 0x1000, 0x0, r3, r6, 0x7fffffff, 0x91c8}}}, &(0x7f0000002640)={0x70, 0x0, 0x0, [{0x5, 0xbd, 0x14, 0x7, 'security.capability\x00'}, {0x2, 0x6f, 0x14, 0x640, 'security.capability\x00'}]}, &(0x7f0000004780)={0x540, 0x0, 0xa1, [{{0x1, 0x2, 0xffffffffffffffff, 0xfff, 0x6, 0x80, {0x5, 0x5, 0x7ff, 0xffff, 0xe0, 0x1, 0x0, 0x99a, 0x101, 0xa000, 0x0, 0xffffffffffffffff, r7, 0x757, 0x200}}, {0x2, 0x0, 0x14, 0xfffeffff, 'security.capability\x00'}}, {{0x6, 0x1, 0x3f, 0x3, 0x5, 0x40, {0x5, 0x101, 0xfffffffffffffff8, 0x7, 0x6, 0x5, 0xa8000000, 0x6, 0x664, 0x1000, 0x1, r9, 0xee01, 0x7, 0x9}}, {0x1, 0x8, 0x1, 0x8, '\xbb'}}, {{0x2, 0x0, 0x8, 0xca, 0x4, 0x7, {0x0, 0xa1, 0x2, 0x80, 0x10000, 0x9, 0x4, 0x3, 0x1, 0x2000, 0x4, r11, r12, 0x60, 0x3}}, {0x0, 0x0, 0x0, 0x3}}, {{0x1, 0x2, 0x8, 0x6f, 0x10000, 0x7fffffff, {0x0, 0x6, 0x8, 0x20, 0x6, 0x500000, 0x2bf, 0xeb, 0x20, 0x6000, 0x723, r13, r14, 0xe72e, 0x3ff}}, {0x1, 0x0, 0x1, 0xffffffff, '#'}}, {{0x4, 0x3, 0x0, 0x4, 0x8, 0x481b, {0x2, 0x5, 0x6, 0x2, 0x1, 0x3f, 0x80000000, 0x7fff, 0x1, 0x0, 0x7, 0xee00, r15, 0x9, 0x400}}, {0x0, 0x9, 0x14, 0x747, 'security.capability\x00'}}, {{0x6, 0x400, 0x9, 0x9, 0x0, 0x9, {0x2, 0x8000, 0x8, 0x7fff, 0x2, 0x8, 0x3, 0x9, 0x9, 0x1000, 0x4, 0xffffffffffffffff, r18, 0x48eed541, 0xa778}}, {0x3, 0xffffffff00000001, 0x14, 0x0, 'security.capability\x00'}}, {{0x3, 0x2, 0x4, 0x5, 0x1, 0x0, {0x3, 0x101, 0x40c6, 0x6, 0x100, 0x5, 0x0, 0xfffff786, 0x1, 0xa000, 0x1, 0x0, 0xffffffffffffffff, 0x7, 0x6}}, {0x4, 0x7f, 0x14, 0x6, 'security.capability\x00'}}, {{0x3, 0x1, 0xb9, 0x5, 0x7fffffff, 0x9, {0x1, 0x1f, 0x0, 0x8001, 0x800, 0x7fffffff, 0x7fffffff, 0xff, 0x6, 0x1000, 0x4, r19, 0x0, 0x619, 0x800}}, {0x3, 0x260b, 0x0, 0x8}}]}, &(0x7f0000004d80)={0xa0, 0x0, 0x0, {{0x5, 0x1, 0x8000000000000000, 0x7, 0x6c77, 0x8, {0x6, 0x9, 0x7, 0x8, 0x7, 0x9, 0x800, 0x6, 0x7, 0x9000, 0x3ff80, r20, 0x0, 0x20, 0x80000001}}, {0x0, 0x1}}}, &(0x7f0000004e40)={0x20, 0x0, 0xfffffffffffffc00, {0xae, 0x4, 0x0, 0xe43}}}) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r21 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r21, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000040)='./file0\x00', 0x82200, 0x27) 21:36:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0x3, @private1, 0x200}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0xffffffffffffff01, r0, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e22, 0x7, @remote, 0x3ff}}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e22, 0x7, @remote, 0x3ff}}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:56 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002740)={0x2020, 0x0, 0x0, 0x0}, 0x10ce) mount$nfs4(&(0x7f00000000c0)=']*){!{{\x00', 0xffffffffffffffff, &(0x7f0000000140), 0x2008000, &(0x7f00000024c0)={[{'&\xbb^\xbd\x88\x83\xf6RN\xd2\x1b\x1b\x0f\xd8|\vp\xec\xec\x95V\x14\x98L\aL\x14\xe8\x91\xed\xcb\xd5\x19\x84b\x84\x03\xdbw\x85\xc4\v\xc3\x00\x9d\xa8\x99\xc8\xc2H\xc3\x9dg?\xd9\x12x\xb8`\xae\xbcA\xbe#\xbe\xbd7\xc3\xcf\xa9\xc8$\xc8\xec\xe2[6\xf7\n\t5v\xb1\x83\x96\xaf{5H\xa5\xf9q\x0e\x91}[\xdd\x90\xa5\xec\xa8V\x01\xd1o\xf2iU\x99\x98*@\x11H\x8e\xd4w\xca\x8e'}, {'/dev/infiniband/rdma_cm\x00'}, {'^^'}, {'&)/,\'['}, {'/dev/infiniband/rdma_cm\x00'}, {'.'}, {'{:'}, {'\x00'}, {'8-(!:^!*X\xa0\xb0{8\x1c\x82\xf4O\xaf\x1b\x8c)\xe3=y\xdb\xb5\xfe*h\xc6;\xd9m\xf0V\xfd\xac \xba\xad\xd82s\xa5d\xc0~UZB\xc4\x05\xd4\xf7L\xaf\"Q\x8c\x91\x0f\xb8\xb5R\xffXyS:$\x06\xff\x97\xfa\x98\xcd\x8c\x85t\x17\x8a\xfa\xb6(\x87b\x94\xec\xc0\xf2\x00\v\xe6\xcc\x80\xd6\xc3\xd9\xc8uOUO\xdf\xf5\xdc\x13u\xd0\x15><\xa7\xc8\xca(\x90\xf5\xdcw\xc7\xc1O\xbc\x9f\x05\xd7\x9c\xe8K\xb5\x95I\xd6\xde\xa9\xa4\xec\xf5\xeb\xaf\xe1\x89\x00\x00\x00\x00\x00\x00\x00\x02SN\x1f\x18\x068~[2\x82K\xee\x94:o\x00u\x11\xbe\xcdW\xab\xbf\x0e\x9f\x83\xe6Z\r\xf7\nD@\xc3\x9c\xb1\t\x94\v\tY\x0e_\x89^\x10\xfa\x8a\xad\xfb\x03\xabb\x97\x03\x02\xcd\x1b\xa0\xe6\xbd\x87\xafTF\xa7K\xf7\r\\2\x01\x9b\xff\xa8\xf8\x86\xd5\xde\xd3\xe5\x80\x06F\xaa\xd6\x0e\xbf\xe9uv5\xb01\xd4\xd7S\x11\xb6&\x11\xbf\xdb\xe5\xbd_'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@seclabel}, {@hash}, {@euid_gt={'euid>', 0xee01}}, {@fowner_gt}, {@appraise_type}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_type={'obj_type', 0x3d, '*)'}}]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x2, 0xf}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e24, 0x7, @private1}}}, 0x38) [ 3003.590692] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3003.598418] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3003.605688] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3003.612954] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3003.620223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3003.627492] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={[0x40]}, 0x8}) 21:36:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:57 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:36:57 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) getgid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) 21:36:57 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 12) 21:36:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002740)={0x2020, 0x0, 0x0, 0x0}, 0x10ce) mount$nfs4(&(0x7f00000000c0)=']*){!{{\x00', 0xffffffffffffffff, &(0x7f0000000140), 0x2008000, &(0x7f00000024c0)={[{'&\xbb^\xbd\x88\x83\xf6RN\xd2\x1b\x1b\x0f\xd8|\vp\xec\xec\x95V\x14\x98L\aL\x14\xe8\x91\xed\xcb\xd5\x19\x84b\x84\x03\xdbw\x85\xc4\v\xc3\x00\x9d\xa8\x99\xc8\xc2H\xc3\x9dg?\xd9\x12x\xb8`\xae\xbcA\xbe#\xbe\xbd7\xc3\xcf\xa9\xc8$\xc8\xec\xe2[6\xf7\n\t5v\xb1\x83\x96\xaf{5H\xa5\xf9q\x0e\x91}[\xdd\x90\xa5\xec\xa8V\x01\xd1o\xf2iU\x99\x98*@\x11H\x8e\xd4w\xca\x8e'}, {'/dev/infiniband/rdma_cm\x00'}, {'^^'}, {'&)/,\'['}, {'/dev/infiniband/rdma_cm\x00'}, {'.'}, {'{:'}, {'\x00'}, {'8-(!:^!*X\xa0\xb0{8\x1c\x82\xf4O\xaf\x1b\x8c)\xe3=y\xdb\xb5\xfe*h\xc6;\xd9m\xf0V\xfd\xac \xba\xad\xd82s\xa5d\xc0~UZB\xc4\x05\xd4\xf7L\xaf\"Q\x8c\x91\x0f\xb8\xb5R\xffXyS:$\x06\xff\x97\xfa\x98\xcd\x8c\x85t\x17\x8a\xfa\xb6(\x87b\x94\xec\xc0\xf2\x00\v\xe6\xcc\x80\xd6\xc3\xd9\xc8uOUO\xdf\xf5\xdc\x13u\xd0\x15><\xa7\xc8\xca(\x90\xf5\xdcw\xc7\xc1O\xbc\x9f\x05\xd7\x9c\xe8K\xb5\x95I\xd6\xde\xa9\xa4\xec\xf5\xeb\xaf\xe1\x89\x00\x00\x00\x00\x00\x00\x00\x02SN\x1f\x18\x068~[2\x82K\xee\x94:o\x00u\x11\xbe\xcdW\xab\xbf\x0e\x9f\x83\xe6Z\r\xf7\nD@\xc3\x9c\xb1\t\x94\v\tY\x0e_\x89^\x10\xfa\x8a\xad\xfb\x03\xabb\x97\x03\x02\xcd\x1b\xa0\xe6\xbd\x87\xafTF\xa7K\xf7\r\\2\x01\x9b\xff\xa8\xf8\x86\xd5\xde\xd3\xe5\x80\x06F\xaa\xd6\x0e\xbf\xe9uv5\xb01\xd4\xd7S\x11\xb6&\x11\xbf\xdb\xe5\xbd_'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@seclabel}, {@hash}, {@euid_gt={'euid>', 0xee01}}, {@fowner_gt}, {@appraise_type}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_type={'obj_type', 0x3d, '*)'}}]}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x2, 0xf}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e24, 0x7, @private1}}}, 0x38) 21:36:57 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) getgid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) 21:36:57 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3004.206878] FAULT_INJECTION: forcing a failure. [ 3004.206878] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.229143] CPU: 1 PID: 27231 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3004.237064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3004.246423] Call Trace: [ 3004.249009] dump_stack+0x1b2/0x281 [ 3004.252635] should_fail.cold+0x10a/0x149 [ 3004.256778] ? mempool_free+0x1d0/0x1d0 [ 3004.260757] should_failslab+0xd6/0x130 [ 3004.264762] kmem_cache_alloc+0x40/0x3c0 [ 3004.268826] ? mempool_free+0x1d0/0x1d0 [ 3004.272790] mempool_alloc+0x10e/0x2d0 [ 3004.276689] ? mempool_free+0x1d0/0x1d0 [ 3004.280668] ? remove_element.isra.0+0x1b0/0x1b0 [ 3004.285425] ? remove_element.isra.0+0x1b0/0x1b0 [ 3004.290176] ? __test_set_page_writeback+0x3eb/0x1000 [ 3004.295356] ? __unlock_page_memcg+0x4f/0x100 [ 3004.299846] bvec_alloc+0xcc/0x2d0 [ 3004.303378] bio_alloc_bioset+0x585/0x830 [ 3004.307520] ? bvec_alloc+0x2d0/0x2d0 [ 3004.311318] ext4_bio_write_page+0x743/0x1160 [ 3004.315808] mpage_submit_page+0x128/0x220 [ 3004.320057] ext4_writepages+0x1cd3/0x32a0 [ 3004.324303] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3004.329070] ? trace_hardirqs_on+0x10/0x10 [ 3004.333294] ? ext4_expand_extra_isize+0x460/0x460 [ 3004.338217] ? __mark_inode_dirty+0x33b/0xf40 [ 3004.342708] ? ext4_mark_inode_dirty+0x7a0/0x7a0 [ 3004.347464] do_writepages+0xc3/0x240 [ 3004.351261] ? page_writeback_cpu_online+0x10/0x10 [ 3004.356180] ? lock_acquire+0x170/0x3f0 [ 3004.360144] ? do_raw_spin_unlock+0x164/0x220 [ 3004.364627] ? _raw_spin_unlock+0x29/0x40 [ 3004.368775] ? wbc_attach_and_unlock_inode+0x5e8/0x8d0 [ 3004.374051] __filemap_fdatawrite_range+0x236/0x310 [ 3004.379057] ? replace_page_cache_page+0x700/0x700 [ 3004.383988] file_write_and_wait_range+0x86/0xd0 [ 3004.388759] __generic_file_fsync+0x70/0x190 [ 3004.393159] ext4_sync_file+0x8ed/0x12c0 [ 3004.397212] ? ext4_getfsmap+0x8c0/0x8c0 [ 3004.401279] vfs_fsync_range+0x103/0x260 [ 3004.405343] ext4_file_write_iter+0x5fa/0xd20 [ 3004.409831] ? aa_file_perm+0x304/0xab0 [ 3004.413820] ? ext4_file_read_iter+0x330/0x330 [ 3004.418394] ? trace_hardirqs_on+0x10/0x10 [ 3004.422635] ? iov_iter_init+0xa6/0x1c0 [ 3004.426647] __vfs_write+0x44c/0x630 [ 3004.430361] ? kernel_read+0x110/0x110 [ 3004.434248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3004.439254] vfs_write+0x17f/0x4d0 [ 3004.442802] SyS_write+0xf2/0x210 [ 3004.446269] ? SyS_read+0x210/0x210 [ 3004.449888] ? __do_page_fault+0x159/0xad0 [ 3004.454129] ? do_syscall_64+0x4c/0x640 [ 3004.458212] ? SyS_read+0x210/0x210 [ 3004.461837] do_syscall_64+0x1d5/0x640 [ 3004.465739] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3004.470926] RIP: 0033:0x7f043d3b60f9 [ 3004.474638] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3004.482341] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3004.489606] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3004.496964] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 21:36:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002740)={0x2020, 0x0, 0x0, 0x0}, 0x10ce) mount$nfs4(&(0x7f00000000c0)=']*){!{{\x00', 0xffffffffffffffff, &(0x7f0000000140), 0x2008000, &(0x7f00000024c0)={[{'&\xbb^\xbd\x88\x83\xf6RN\xd2\x1b\x1b\x0f\xd8|\vp\xec\xec\x95V\x14\x98L\aL\x14\xe8\x91\xed\xcb\xd5\x19\x84b\x84\x03\xdbw\x85\xc4\v\xc3\x00\x9d\xa8\x99\xc8\xc2H\xc3\x9dg?\xd9\x12x\xb8`\xae\xbcA\xbe#\xbe\xbd7\xc3\xcf\xa9\xc8$\xc8\xec\xe2[6\xf7\n\t5v\xb1\x83\x96\xaf{5H\xa5\xf9q\x0e\x91}[\xdd\x90\xa5\xec\xa8V\x01\xd1o\xf2iU\x99\x98*@\x11H\x8e\xd4w\xca\x8e'}, {'/dev/infiniband/rdma_cm\x00'}, {'^^'}, {'&)/,\'['}, {'/dev/infiniband/rdma_cm\x00'}, {'.'}, {'{:'}, {'\x00'}, {'8-(!:^!*X\xa0\xb0{8\x1c\x82\xf4O\xaf\x1b\x8c)\xe3=y\xdb\xb5\xfe*h\xc6;\xd9m\xf0V\xfd\xac \xba\xad\xd82s\xa5d\xc0~UZB\xc4\x05\xd4\xf7L\xaf\"Q\x8c\x91\x0f\xb8\xb5R\xffXyS:$\x06\xff\x97\xfa\x98\xcd\x8c\x85t\x17\x8a\xfa\xb6(\x87b\x94\xec\xc0\xf2\x00\v\xe6\xcc\x80\xd6\xc3\xd9\xc8uOUO\xdf\xf5\xdc\x13u\xd0\x15><\xa7\xc8\xca(\x90\xf5\xdcw\xc7\xc1O\xbc\x9f\x05\xd7\x9c\xe8K\xb5\x95I\xd6\xde\xa9\xa4\xec\xf5\xeb\xaf\xe1\x89\x00\x00\x00\x00\x00\x00\x00\x02SN\x1f\x18\x068~[2\x82K\xee\x94:o\x00u\x11\xbe\xcdW\xab\xbf\x0e\x9f\x83\xe6Z\r\xf7\nD@\xc3\x9c\xb1\t\x94\v\tY\x0e_\x89^\x10\xfa\x8a\xad\xfb\x03\xabb\x97\x03\x02\xcd\x1b\xa0\xe6\xbd\x87\xafTF\xa7K\xf7\r\\2\x01\x9b\xff\xa8\xf8\x86\xd5\xde\xd3\xe5\x80\x06F\xaa\xd6\x0e\xbf\xe9uv5\xb01\xd4\xd7S\x11\xb6&\x11\xbf\xdb\xe5\xbd_'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@seclabel}, {@hash}, {@euid_gt={'euid>', 0xee01}}, {@fowner_gt}, {@appraise_type}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_type={'obj_type', 0x3d, '*)'}}]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x2, 0xf}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e24, 0x7, @private1}}}, 0x38) 21:36:57 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3004.504253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3004.511521] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:57 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 13) 21:36:57 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) getgid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) [ 3004.633576] FAULT_INJECTION: forcing a failure. [ 3004.633576] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.645534] CPU: 0 PID: 27257 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3004.653447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3004.662815] Call Trace: [ 3004.665427] dump_stack+0x1b2/0x281 [ 3004.669087] should_fail.cold+0x10a/0x149 [ 3004.673236] ? mempool_free+0x1d0/0x1d0 [ 3004.677325] should_failslab+0xd6/0x130 [ 3004.681300] kmem_cache_alloc+0x40/0x3c0 [ 3004.685357] ? mempool_free+0x1d0/0x1d0 [ 3004.689365] mempool_alloc+0x10e/0x2d0 [ 3004.693271] ? remove_element.isra.0+0x1b0/0x1b0 [ 3004.698024] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3004.703467] ? mark_page_accessed+0x20c/0x530 [ 3004.707961] bio_alloc_bioset+0x41b/0x830 [ 3004.712106] ? bvec_alloc+0x2d0/0x2d0 [ 3004.715902] submit_bh_wbc+0xf5/0x6f0 [ 3004.719698] __sync_dirty_buffer+0xef/0x290 [ 3004.724015] ext4_write_inode+0x34e/0x430 [ 3004.728160] ? __ext4_iget+0x38e0/0x38e0 [ 3004.732228] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3004.737678] __writeback_single_inode+0x6a4/0x1010 [ 3004.742606] writeback_single_inode+0x1f3/0x370 [ 3004.747270] sync_inode_metadata+0x79/0xa0 [ 3004.751495] ? sync_inode+0x20/0x20 [ 3004.755122] __generic_file_fsync+0x121/0x190 [ 3004.759628] ext4_sync_file+0x8ed/0x12c0 [ 3004.763697] ? ext4_getfsmap+0x8c0/0x8c0 [ 3004.767751] vfs_fsync_range+0x103/0x260 [ 3004.771817] ext4_file_write_iter+0x5fa/0xd20 [ 3004.776314] ? aa_file_perm+0x304/0xab0 [ 3004.780280] ? ext4_file_read_iter+0x330/0x330 [ 3004.784856] ? trace_hardirqs_on+0x10/0x10 [ 3004.789087] ? iov_iter_init+0xa6/0x1c0 [ 3004.793052] __vfs_write+0x44c/0x630 [ 3004.796768] ? kernel_read+0x110/0x110 [ 3004.800670] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3004.805687] vfs_write+0x17f/0x4d0 [ 3004.809222] SyS_write+0xf2/0x210 [ 3004.812674] ? SyS_read+0x210/0x210 [ 3004.816295] ? __do_page_fault+0x159/0xad0 [ 3004.820524] ? do_syscall_64+0x4c/0x640 [ 3004.824506] ? SyS_read+0x210/0x210 [ 3004.828162] do_syscall_64+0x1d5/0x640 [ 3004.832044] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3004.837232] RIP: 0033:0x7f043d3b60f9 [ 3004.840944] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3004.848642] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3004.855902] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3004.863164] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3004.870527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3004.877789] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) 21:36:58 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 3: syz_open_dev$rtc(&(0x7f0000000000), 0x40, 0x40000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x0, 0x5, 0x8, 0x1, 'syz1\x00', 0x27a1}, 0x0, 0x40, 0x8, 0x0, 0x5, 0x7f, 'syz0\x00', &(0x7f0000000080)=['-\x00', '/dev/infiniband/rdma_cm\x00', '/dev/rtc#\x00', '!}.\x00', '/dev/infiniband/rdma_cm\x00'], 0x40}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000280)={{0x5, 0x5, 0x80000001, 0x9}, 0x2, 0x20, 0x0, 0xffffffffffffffff, 0x4, 0x4, 'syz0\x00', &(0x7f00000000c0)=[':r:{]%#\x00', '/dev/infiniband/rdma_cm\x00', '*&@}\x00', '\x00'], 0x26}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 14) 21:36:58 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/181, 0xb5) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 3: syz_open_dev$rtc(&(0x7f0000000000), 0x40, 0x40000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x0, 0x5, 0x8, 0x1, 'syz1\x00', 0x27a1}, 0x0, 0x40, 0x8, 0x0, 0x5, 0x7f, 'syz0\x00', &(0x7f0000000080)=['-\x00', '/dev/infiniband/rdma_cm\x00', '/dev/rtc#\x00', '!}.\x00', '/dev/infiniband/rdma_cm\x00'], 0x40}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000280)={{0x5, 0x5, 0x80000001, 0x9}, 0x2, 0x20, 0x0, 0xffffffffffffffff, 0x4, 0x4, 'syz0\x00', &(0x7f00000000c0)=[':r:{]%#\x00', '/dev/infiniband/rdma_cm\x00', '*&@}\x00', '\x00'], 0x26}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000), 0x40, 0x40000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x0, 0x5, 0x8, 0x1, 'syz1\x00', 0x27a1}, 0x0, 0x40, 0x8, 0x0, 0x5, 0x7f, 'syz0\x00', &(0x7f0000000080)=['-\x00', '/dev/infiniband/rdma_cm\x00', '/dev/rtc#\x00', '!}.\x00', '/dev/infiniband/rdma_cm\x00'], 0x40}) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000280)={{0x5, 0x5, 0x80000001, 0x9}, 0x2, 0x20, 0x0, 0xffffffffffffffff, 0x4, 0x4, 'syz0\x00', &(0x7f00000000c0)=[':r:{]%#\x00', '/dev/infiniband/rdma_cm\x00', '*&@}\x00', '\x00'], 0x26}) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) 21:36:58 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:58 executing program 4: openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x171f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x121000, 0xae) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000140)='\x00', 0x100, 0x101) r2 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x14008, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff8}}], [{@hash}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x75b2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user}, {@obj_type={'obj_type', 0x3d, '+#:'}}, {@measure}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}, {@obj_role={'obj_role', 0x3d, 'security.capability\x00'}}]}}) 21:36:58 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt={'uid<', r0}}]}}) [ 3005.134924] FAULT_INJECTION: forcing a failure. [ 3005.134924] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.185711] CPU: 1 PID: 27268 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3005.193651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3005.203011] Call Trace: [ 3005.205596] dump_stack+0x1b2/0x281 [ 3005.209221] should_fail.cold+0x10a/0x149 [ 3005.213370] ? mempool_free+0x1d0/0x1d0 [ 3005.217338] should_failslab+0xd6/0x130 [ 3005.221306] kmem_cache_alloc+0x40/0x3c0 [ 3005.225367] ? mempool_free+0x1d0/0x1d0 [ 3005.229333] mempool_alloc+0x10e/0x2d0 [ 3005.233233] ? remove_element.isra.0+0x1b0/0x1b0 [ 3005.237998] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3005.243451] ? mark_page_accessed+0x20c/0x530 [ 3005.247940] bio_alloc_bioset+0x41b/0x830 [ 3005.252081] ? bvec_alloc+0x2d0/0x2d0 [ 3005.255917] submit_bh_wbc+0xf5/0x6f0 [ 3005.259722] __sync_dirty_buffer+0xef/0x290 [ 3005.264046] ext4_write_inode+0x34e/0x430 [ 3005.268197] ? __ext4_iget+0x38e0/0x38e0 [ 3005.272263] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3005.277724] __writeback_single_inode+0x6a4/0x1010 [ 3005.282649] writeback_single_inode+0x1f3/0x370 [ 3005.287327] sync_inode_metadata+0x79/0xa0 [ 3005.291567] ? sync_inode+0x20/0x20 [ 3005.295203] __generic_file_fsync+0x121/0x190 [ 3005.299694] ext4_sync_file+0x8ed/0x12c0 [ 3005.303834] ? ext4_getfsmap+0x8c0/0x8c0 [ 3005.307888] vfs_fsync_range+0x103/0x260 [ 3005.311942] ext4_file_write_iter+0x5fa/0xd20 [ 3005.316430] ? aa_file_perm+0x304/0xab0 [ 3005.320398] ? ext4_file_read_iter+0x330/0x330 [ 3005.324997] ? trace_hardirqs_on+0x10/0x10 [ 3005.329239] ? iov_iter_init+0xa6/0x1c0 [ 3005.333206] __vfs_write+0x44c/0x630 [ 3005.336914] ? kernel_read+0x110/0x110 [ 3005.340800] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3005.345807] vfs_write+0x17f/0x4d0 [ 3005.349430] SyS_write+0xf2/0x210 [ 3005.352895] ? SyS_read+0x210/0x210 [ 3005.356514] ? __do_page_fault+0x159/0xad0 [ 3005.360738] ? do_syscall_64+0x4c/0x640 [ 3005.364705] ? SyS_read+0x210/0x210 [ 3005.368338] do_syscall_64+0x1d5/0x640 [ 3005.372228] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3005.377409] RIP: 0033:0x7f043d3b60f9 [ 3005.381367] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3005.389084] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 [ 3005.396352] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3005.403611] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3005.410884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3005.418145] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 15) 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 3: syz_open_dev$rtc(&(0x7f0000000000), 0x40, 0x40000) (async) syz_open_dev$rtc(&(0x7f0000000000), 0x40, 0x40000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x0, 0x5, 0x8, 0x1, 'syz1\x00', 0x27a1}, 0x0, 0x40, 0x8, 0x0, 0x5, 0x7f, 'syz0\x00', &(0x7f0000000080)=['-\x00', '/dev/infiniband/rdma_cm\x00', '/dev/rtc#\x00', '!}.\x00', '/dev/infiniband/rdma_cm\x00'], 0x40}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000280)={{0x5, 0x5, 0x80000001, 0x9}, 0x2, 0x20, 0x0, 0xffffffffffffffff, 0x4, 0x4, 'syz0\x00', &(0x7f00000000c0)=[':r:{]%#\x00', '/dev/infiniband/rdma_cm\x00', '*&@}\x00', '\x00'], 0x26}) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000280)={{0x5, 0x5, 0x80000001, 0x9}, 0x2, 0x20, 0x0, 0xffffffffffffffff, 0x4, 0x4, 'syz0\x00', &(0x7f00000000c0)=[':r:{]%#\x00', '/dev/infiniband/rdma_cm\x00', '*&@}\x00', '\x00'], 0x26}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:58 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:36:58 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0/../file0\x00'}) setxattr$incfs_size(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=0x4, 0x8, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0xffffffffffffff5e, 0xfffffffffffffff5}, 0x28) getitimer(0x1, &(0x7f0000000180)) [ 3005.527076] audit: type=1804 audit(1677793018.552:2542): pid=27287 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13398/file0" dev="sda1" ino=14978 res=1 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3005.611144] FAULT_INJECTION: forcing a failure. [ 3005.611144] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.633338] CPU: 0 PID: 27293 Comm: syz-executor.1 Not tainted 4.14.307-syzkaller #0 [ 3005.641347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3005.650799] Call Trace: [ 3005.653407] dump_stack+0x1b2/0x281 [ 3005.657062] should_fail.cold+0x10a/0x149 21:36:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 21:36:58 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x309981, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000002e2f66696c653000"]) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) readlink(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002200)=""/131, 0x83) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, r4, {{0x0, 0x2000}}}, 0x28) [ 3005.661238] ? mempool_free+0x1d0/0x1d0 [ 3005.665229] should_failslab+0xd6/0x130 [ 3005.669225] kmem_cache_alloc+0x40/0x3c0 [ 3005.673305] ? mempool_free+0x1d0/0x1d0 [ 3005.677310] mempool_alloc+0x10e/0x2d0 [ 3005.681245] ? remove_element.isra.0+0x1b0/0x1b0 [ 3005.686111] ? lock_downgrade+0x740/0x740 [ 3005.690381] ? do_raw_spin_unlock+0x164/0x220 [ 3005.694892] bio_alloc_bioset+0x41b/0x830 [ 3005.699065] ? lock_downgrade+0x740/0x740 [ 3005.703232] ? bvec_alloc+0x2d0/0x2d0 [ 3005.707056] blkdev_issue_flush+0xeb/0x320 21:36:58 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x181) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) [ 3005.711316] ext4_sync_file+0xb6c/0x12c0 [ 3005.715399] ? ext4_getfsmap+0x8c0/0x8c0 [ 3005.719479] vfs_fsync_range+0x103/0x260 [ 3005.723557] ext4_file_write_iter+0x5fa/0xd20 [ 3005.728070] ? aa_file_perm+0x304/0xab0 [ 3005.732240] ? ext4_file_read_iter+0x330/0x330 [ 3005.736841] ? trace_hardirqs_on+0x10/0x10 [ 3005.741102] ? iov_iter_init+0xa6/0x1c0 [ 3005.745104] __vfs_write+0x44c/0x630 [ 3005.749100] ? kernel_read+0x110/0x110 [ 3005.753016] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3005.758056] vfs_write+0x17f/0x4d0 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3005.761703] SyS_write+0xf2/0x210 [ 3005.765209] ? SyS_read+0x210/0x210 [ 3005.768851] ? __do_page_fault+0x159/0xad0 [ 3005.773194] ? do_syscall_64+0x4c/0x640 [ 3005.777444] ? SyS_read+0x210/0x210 [ 3005.781096] do_syscall_64+0x1d5/0x640 [ 3005.785007] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3005.790226] RIP: 0033:0x7f043d3b60f9 [ 3005.793949] RSP: 002b:00007f043b928168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3005.801672] RAX: ffffffffffffffda RBX: 00007f043d4d5f80 RCX: 00007f043d3b60f9 21:36:58 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x309981, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000002e2f66696c653000"]) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) readlink(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002200)=""/131, 0x83) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, r4, {{0x0, 0x2000}}}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x309981, 0x0) (async) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000002e2f66696c653000"]) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) readlink(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002200)=""/131, 0x83) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, r4, {{0x0, 0x2000}}}, 0x28) (async) 21:36:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (fail_nth: 16) 21:36:58 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) [ 3005.808957] RDX: 0000000000000028 RSI: 0000000020000000 RDI: 0000000000000003 [ 3005.816240] RBP: 00007f043b9281d0 R08: 0000000000000000 R09: 0000000000000000 [ 3005.823619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3005.831024] R13: 00007ffc776f56df R14: 00007f043b928300 R15: 0000000000022000 21:36:58 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (fail_nth: 1) [ 3005.912366] audit: type=1804 audit(1677793018.932:2543): pid=27316 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir663327534/syzkaller.YtvcWi/13400/file0" dev="sda1" ino=14885 res=1 21:36:59 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x309981, 0x0) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x309981, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x3, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000002e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000002e2f66696c653000"]) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) readlink(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002200)=""/131, 0x83) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r4, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, r4, {{0x0, 0x2000}}}, 0x28) 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 21:36:59 executing program 0: setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb4f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) setxattr$security_capability(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), &(0x7f00000005c0)=@v3={0x3000000, [{0x20, 0x100}, {0xbb, 0x8}], r2}, 0x18, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x3}, {0x8}, 0x1, 0x0, 0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)="09019e3906125b045b797c2ce4bf343291887e2afdf45afe5003668c50af2f1cef24a4689a2165face29d640d61e8fc6e84a61b262a12281d44d5d0e9a271b916da88e3b82e6daaaffb27970958d101a30ab4d3f63e80c272886d79538ca0e90d7aeb67415a71e3a05aea564f45ea768573a23317dd6d821137195c972f8db81dc3227894e7872846d1c9fc272e34c912db71cc72f5ce31f83aa702161b9d8f7eb902d081face42b4805c71e8f55663c6c531a0330838455373ee713dc13cb26c143313f9d1f6018", 0xc8, 0x0, &(0x7f0000000280)={0x2, 0x10d, {0x1, 0xc, 0xfb, "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", 0x5, "a6321ba791"}, 0xf8, "091a9b2d5632e6d5d967f1098bfb66e2c21ff854f0855180a8de58b139a1c8dc2fd458966092fa6fbdc17d5bfab2ee8bf091df7de617ac6094c05da1848f03be78e1d727f19eb2cac64080fc4e8a7fc02acb5e45aeafce7a0c0a784af7784d5cfff0c5dc5df4e01f96fbcbb0e8f2c5e9983b8e928ae9e94be8ce0d492b00a26796448305faf1765a31759ce17c9fa0054d2c5f5bb0089232de0b79f08a8784e4ff0b9b8f345cb7ef377f48b116dbf845ef0bb28f25608f98a1187807bf0c78e889e0c66fd917a9bb9a8bceac9649970090ab4ee3551d6f46d606315d4da60998480136fc50d887e9365be377c2e5dcf0b9857243bc25adf2"}, 0x211}) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$9p_xen(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x0, &(0x7f00000007c0)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 21:36:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 21:36:59 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r3 = getuid() r4 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4]) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() r7 = getgid() r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) recvmsg$can_bcm(r8, &(0x7f0000000a80)={&(0x7f00000005c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/181, 0xb5}, {&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/180, 0xb4}, {&(0x7f0000000840)=""/56, 0x38}, {&(0x7f0000000880)=""/104, 0x68}, {&(0x7f0000000900)=""/254, 0xfe}], 0x6}, 0x20) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='Ld=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {r3, r7}}, './file0\x00'}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) unlink(&(0x7f0000000580)='./file0\x00') ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x2}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="8e4a1a270298ee8019b60d85b7d75c559e422aa5f2c89e16b89ef7f69d9e0a3a53b39da9d335ba8f4fbd9c717da32550d0c92426c50e88d2a28b76c81348f049dd137b9d65403285008f018ffe7cec16a753c3c545a034dde505fbfcfec95209f466ee0fb35d12ba5fb13755f9e2777c3417b2cb43b5cbfe50ebfc8233a6eeadcda72b77bd5d151a0a4ece0c8b88f797e3624526f0c056be82e521621f6c45c411edff7d7b95c52f7dceb69478a7261ec06ecda6136812660a88598bcce99cd7b41e5f880e6356606f0dce0f", 0xcc, 0x0, &(0x7f0000000300)={0x2, 0xd1, {0x0, 0xc, 0x9b, "b34f953fc4567adfe779bf40f595e1ede10883aace07bc023bcdc422389ce57b70018ab6c32deffc2ed05a77713f1cd66ddf729be8ec6aa837996155fe1000b398a3443ac13642efe92d6a7dfc17c3cede48aa54f7f137b7204e1794246e7fc7cc434fc760ae4c21e074cc7987bca084c7a521a4ddd1aaff6d5046854455e72d24a4e3bfad6095c048a79573737c107b4e2d821f78d8d557305ec7", 0x29, "59c757531d7361f2bf9aabc90b6ff2273117caa97d94137ce0850b6f50ab004c7ec5b000c2fbae35c7"}, 0xd2, "004d5c01e0a1b0c7cdbf542dc451b9cdacdbd9e02a41cf23617c7ce13b61e220293eb8ade4e42171e05bc02eae1309a9ffdf56793d991b9bd3c569d7370babf465e5ed3e4208bd6b69aba4506c9a6702129d2a92bab8e46f9895656b6038300172ef2411d8ad55cf05a713fa4ebbd54ddecb2e068cb36c4127aa1b2be7f8c6f7d51aeb17f8e6293cd404f94a044da5d5518f139347557a7ff1c42a17c682752b8b261da385b86e5a7b5b3c09ce02a955cb4de8eb0eadf86010ca83893a0647df36d144c7148e6f0e2fbd9264d8646e1a771f"}, 0x1af}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r9, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) [ 3006.187075] audit: type=1800 audit(1677793019.202:2544): pid=27360 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14881 res=0 [ 3006.220695] 9pnet: Could not find request transport: xen [ 3006.252828] audit: type=1804 audit(1677793019.242:2545): pid=27360 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13451/file0" dev="sda1" ino=14881 res=1 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 21:36:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb4f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r2 = getuid() (async) r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) setxattr$security_capability(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), &(0x7f00000005c0)=@v3={0x3000000, [{0x20, 0x100}, {0xbb, 0x8}], r2}, 0x18, 0x0) (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x3}, {0x8}, 0x1, 0x0, 0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)="09019e3906125b045b797c2ce4bf343291887e2afdf45afe5003668c50af2f1cef24a4689a2165face29d640d61e8fc6e84a61b262a12281d44d5d0e9a271b916da88e3b82e6daaaffb27970958d101a30ab4d3f63e80c272886d79538ca0e90d7aeb67415a71e3a05aea564f45ea768573a23317dd6d821137195c972f8db81dc3227894e7872846d1c9fc272e34c912db71cc72f5ce31f83aa702161b9d8f7eb902d081face42b4805c71e8f55663c6c531a0330838455373ee713dc13cb26c143313f9d1f6018", 0xc8, 0x0, &(0x7f0000000280)={0x2, 0x10d, {0x1, 0xc, 0xfb, "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", 0x5, "a6321ba791"}, 0xf8, "091a9b2d5632e6d5d967f1098bfb66e2c21ff854f0855180a8de58b139a1c8dc2fd458966092fa6fbdc17d5bfab2ee8bf091df7de617ac6094c05da1848f03be78e1d727f19eb2cac64080fc4e8a7fc02acb5e45aeafce7a0c0a784af7784d5cfff0c5dc5df4e01f96fbcbb0e8f2c5e9983b8e928ae9e94be8ce0d492b00a26796448305faf1765a31759ce17c9fa0054d2c5f5bb0089232de0b79f08a8784e4ff0b9b8f345cb7ef377f48b116dbf845ef0bb28f25608f98a1187807bf0c78e889e0c66fd917a9bb9a8bceac9649970090ab4ee3551d6f46d606315d4da60998480136fc50d887e9365be377c2e5dcf0b9857243bc25adf2"}, 0x211}) (async) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) mount$9p_xen(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x0, &(0x7f00000007c0)) (async) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3006.282290] audit: type=1804 audit(1677793019.242:2546): pid=27360 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13451/file0" dev="sda1" ino=14881 res=1 [ 3006.317780] audit: type=1804 audit(1677793019.342:2547): pid=27367 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13966/file0" dev="sda1" ino=15345 res=1 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 0: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 21:36:59 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r3 = getuid() r4 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4]) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r6 = getuid() getgid() (async) r7 = getgid() r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) recvmsg$can_bcm(r8, &(0x7f0000000a80)={&(0x7f00000005c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/181, 0xb5}, {&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/180, 0xb4}, {&(0x7f0000000840)=""/56, 0x38}, {&(0x7f0000000880)=""/104, 0x68}, {&(0x7f0000000900)=""/254, 0xfe}], 0x6}, 0x20) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='Ld=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {r3, r7}}, './file0\x00'}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) unlink(&(0x7f0000000580)='./file0\x00') (async) unlink(&(0x7f0000000580)='./file0\x00') ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x2}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="8e4a1a270298ee8019b60d85b7d75c559e422aa5f2c89e16b89ef7f69d9e0a3a53b39da9d335ba8f4fbd9c717da32550d0c92426c50e88d2a28b76c81348f049dd137b9d65403285008f018ffe7cec16a753c3c545a034dde505fbfcfec95209f466ee0fb35d12ba5fb13755f9e2777c3417b2cb43b5cbfe50ebfc8233a6eeadcda72b77bd5d151a0a4ece0c8b88f797e3624526f0c056be82e521621f6c45c411edff7d7b95c52f7dceb69478a7261ec06ecda6136812660a88598bcce99cd7b41e5f880e6356606f0dce0f", 0xcc, 0x0, &(0x7f0000000300)={0x2, 0xd1, {0x0, 0xc, 0x9b, "b34f953fc4567adfe779bf40f595e1ede10883aace07bc023bcdc422389ce57b70018ab6c32deffc2ed05a77713f1cd66ddf729be8ec6aa837996155fe1000b398a3443ac13642efe92d6a7dfc17c3cede48aa54f7f137b7204e1794246e7fc7cc434fc760ae4c21e074cc7987bca084c7a521a4ddd1aaff6d5046854455e72d24a4e3bfad6095c048a79573737c107b4e2d821f78d8d557305ec7", 0x29, "59c757531d7361f2bf9aabc90b6ff2273117caa97d94137ce0850b6f50ab004c7ec5b000c2fbae35c7"}, 0xd2, "004d5c01e0a1b0c7cdbf542dc451b9cdacdbd9e02a41cf23617c7ce13b61e220293eb8ade4e42171e05bc02eae1309a9ffdf56793d991b9bd3c569d7370babf465e5ed3e4208bd6b69aba4506c9a6702129d2a92bab8e46f9895656b6038300172ef2411d8ad55cf05a713fa4ebbd54ddecb2e068cb36c4127aa1b2be7f8c6f7d51aeb17f8e6293cd404f94a044da5d5518f139347557a7ff1c42a17c682752b8b261da385b86e5a7b5b3c09ce02a955cb4de8eb0eadf86010ca83893a0647df36d144c7148e6f0e2fbd9264d8646e1a771f"}, 0x1af}) (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x2}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="8e4a1a270298ee8019b60d85b7d75c559e422aa5f2c89e16b89ef7f69d9e0a3a53b39da9d335ba8f4fbd9c717da32550d0c92426c50e88d2a28b76c81348f049dd137b9d65403285008f018ffe7cec16a753c3c545a034dde505fbfcfec95209f466ee0fb35d12ba5fb13755f9e2777c3417b2cb43b5cbfe50ebfc8233a6eeadcda72b77bd5d151a0a4ece0c8b88f797e3624526f0c056be82e521621f6c45c411edff7d7b95c52f7dceb69478a7261ec06ecda6136812660a88598bcce99cd7b41e5f880e6356606f0dce0f", 0xcc, 0x0, &(0x7f0000000300)={0x2, 0xd1, {0x0, 0xc, 0x9b, "b34f953fc4567adfe779bf40f595e1ede10883aace07bc023bcdc422389ce57b70018ab6c32deffc2ed05a77713f1cd66ddf729be8ec6aa837996155fe1000b398a3443ac13642efe92d6a7dfc17c3cede48aa54f7f137b7204e1794246e7fc7cc434fc760ae4c21e074cc7987bca084c7a521a4ddd1aaff6d5046854455e72d24a4e3bfad6095c048a79573737c107b4e2d821f78d8d557305ec7", 0x29, "59c757531d7361f2bf9aabc90b6ff2273117caa97d94137ce0850b6f50ab004c7ec5b000c2fbae35c7"}, 0xd2, "004d5c01e0a1b0c7cdbf542dc451b9cdacdbd9e02a41cf23617c7ce13b61e220293eb8ade4e42171e05bc02eae1309a9ffdf56793d991b9bd3c569d7370babf465e5ed3e4208bd6b69aba4506c9a6702129d2a92bab8e46f9895656b6038300172ef2411d8ad55cf05a713fa4ebbd54ddecb2e068cb36c4127aa1b2be7f8c6f7d51aeb17f8e6293cd404f94a044da5d5518f139347557a7ff1c42a17c682752b8b261da385b86e5a7b5b3c09ce02a955cb4de8eb0eadf86010ca83893a0647df36d144c7148e6f0e2fbd9264d8646e1a771f"}, 0x1af}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r9, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r9, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) [ 3006.352155] audit: type=1804 audit(1677793019.342:2548): pid=27367 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13966/file0" dev="sda1" ino=15345 res=1 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async, rerun: 64) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 0: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb4f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async, rerun: 32) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (rerun: 32) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) (async) setxattr$security_capability(&(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), &(0x7f00000005c0)=@v3={0x3000000, [{0x20, 0x100}, {0xbb, 0x8}], r2}, 0x18, 0x0) (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x3}, {0x8}, 0x1, 0x0, 0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)="09019e3906125b045b797c2ce4bf343291887e2afdf45afe5003668c50af2f1cef24a4689a2165face29d640d61e8fc6e84a61b262a12281d44d5d0e9a271b916da88e3b82e6daaaffb27970958d101a30ab4d3f63e80c272886d79538ca0e90d7aeb67415a71e3a05aea564f45ea768573a23317dd6d821137195c972f8db81dc3227894e7872846d1c9fc272e34c912db71cc72f5ce31f83aa702161b9d8f7eb902d081face42b4805c71e8f55663c6c531a0330838455373ee713dc13cb26c143313f9d1f6018", 0xc8, 0x0, &(0x7f0000000280)={0x2, 0x10d, {0x1, 0xc, 0xfb, "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", 0x5, "a6321ba791"}, 0xf8, "091a9b2d5632e6d5d967f1098bfb66e2c21ff854f0855180a8de58b139a1c8dc2fd458966092fa6fbdc17d5bfab2ee8bf091df7de617ac6094c05da1848f03be78e1d727f19eb2cac64080fc4e8a7fc02acb5e45aeafce7a0c0a784af7784d5cfff0c5dc5df4e01f96fbcbb0e8f2c5e9983b8e928ae9e94be8ce0d492b00a26796448305faf1765a31759ce17c9fa0054d2c5f5bb0089232de0b79f08a8784e4ff0b9b8f345cb7ef377f48b116dbf845ef0bb28f25608f98a1187807bf0c78e889e0c66fd917a9bb9a8bceac9649970090ab4ee3551d6f46d606315d4da60998480136fc50d887e9365be377c2e5dcf0b9857243bc25adf2"}, 0x211}) (async) open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$9p_xen(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x0, &(0x7f00000007c0)) (async) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) 21:36:59 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) r2 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r3 = getuid() (async) r4 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4]) (async) r5 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r6 = getuid() r7 = getgid() r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) recvmsg$can_bcm(r8, &(0x7f0000000a80)={&(0x7f00000005c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/181, 0xb5}, {&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/180, 0xb4}, {&(0x7f0000000840)=""/56, 0x38}, {&(0x7f0000000880)=""/104, 0x68}, {&(0x7f0000000900)=""/254, 0xfe}], 0x6}, 0x20) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='Ld=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r7]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {r3, r7}}, './file0\x00'}) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) unlink(&(0x7f0000000580)='./file0\x00') (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000004c0)={{'\x00', 0x2}, {0x9}, 0x10, 0x0, 0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="8e4a1a270298ee8019b60d85b7d75c559e422aa5f2c89e16b89ef7f69d9e0a3a53b39da9d335ba8f4fbd9c717da32550d0c92426c50e88d2a28b76c81348f049dd137b9d65403285008f018ffe7cec16a753c3c545a034dde505fbfcfec95209f466ee0fb35d12ba5fb13755f9e2777c3417b2cb43b5cbfe50ebfc8233a6eeadcda72b77bd5d151a0a4ece0c8b88f797e3624526f0c056be82e521621f6c45c411edff7d7b95c52f7dceb69478a7261ec06ecda6136812660a88598bcce99cd7b41e5f880e6356606f0dce0f", 0xcc, 0x0, &(0x7f0000000300)={0x2, 0xd1, {0x0, 0xc, 0x9b, "b34f953fc4567adfe779bf40f595e1ede10883aace07bc023bcdc422389ce57b70018ab6c32deffc2ed05a77713f1cd66ddf729be8ec6aa837996155fe1000b398a3443ac13642efe92d6a7dfc17c3cede48aa54f7f137b7204e1794246e7fc7cc434fc760ae4c21e074cc7987bca084c7a521a4ddd1aaff6d5046854455e72d24a4e3bfad6095c048a79573737c107b4e2d821f78d8d557305ec7", 0x29, "59c757531d7361f2bf9aabc90b6ff2273117caa97d94137ce0850b6f50ab004c7ec5b000c2fbae35c7"}, 0xd2, "004d5c01e0a1b0c7cdbf542dc451b9cdacdbd9e02a41cf23617c7ce13b61e220293eb8ade4e42171e05bc02eae1309a9ffdf56793d991b9bd3c569d7370babf465e5ed3e4208bd6b69aba4506c9a6702129d2a92bab8e46f9895656b6038300172ef2411d8ad55cf05a713fa4ebbd54ddecb2e068cb36c4127aa1b2be7f8c6f7d51aeb17f8e6293cd404f94a044da5d5518f139347557a7ff1c42a17c682752b8b261da385b86e5a7b5b3c09ce02a955cb4de8eb0eadf86010ca83893a0647df36d144c7148e6f0e2fbd9264d8646e1a771f"}, 0x1af}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r9, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) [ 3006.475309] kauditd_printk_skb: 2 callbacks suppressed [ 3006.475319] audit: type=1800 audit(1677793019.492:2551): pid=27386 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14916 res=0 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 0: open(0x0, 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) [ 3006.581148] audit: type=1800 audit(1677793019.602:2552): pid=27407 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=15089 res=0 [ 3006.615188] audit: type=1804 audit(1677793019.602:2553): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 [ 3006.624516] 9pnet: Could not find request transport: xen [ 3006.643125] audit: type=1804 audit(1677793019.602:2554): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) acct(&(0x7f0000000040)='./file0\x00') [ 3006.668127] audit: type=1804 audit(1677793019.602:2555): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 [ 3006.692748] audit: type=1804 audit(1677793019.602:2556): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 21:36:59 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000400)=0x1) r1 = getuid() mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x10020, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffffffffffffffd7}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, ')-{{{-'}}, {@audit}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '#'}}, {@smackfsfloor}]}}) ioctl$RTC_WIE_ON(r0, 0x700f) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0xa0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) [ 3006.722481] audit: type=1804 audit(1677793019.602:2557): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 [ 3006.749103] audit: type=1804 audit(1677793019.602:2558): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 [ 3006.798288] audit: type=1804 audit(1677793019.602:2559): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) [ 3006.825714] audit: type=1804 audit(1677793019.602:2560): pid=27409 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir2183809141/syzkaller.P4lI06/13453/file0" dev="sda1" ino=15089 res=1 21:36:59 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:36:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:36:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) acct(&(0x7f0000000040)='./file0\x00') 21:36:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x540, 0xffffffff, 0x228, 0xe8, 0x0, 0xffffffff, 0xffffffff, 0x470, 0x470, 0x470, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@empty, @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xffffff00], 'bond0\x00', 'vcan0\x00', {}, {}, 0x67, 0x0, 0x1, 0x10}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0xaf, {0x20}}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, [0x5398a1f8cebdfdbd, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xff000000, 0xffffffff], 'batadv_slave_1\x00', 'xfrm0\x00', {0xff}, {}, 0x33, 0x8, 0x4, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@hl={{0x28}, {0x0, 0x9}}, @common=@eui64={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0xd74c}}}}, {{@uncond, 0x0, 0x208, 0x248, 0x0, {}, [@common=@unspec=@addrtype1={{0x28}, {0xc4, 0x50, 0x2}}, @common=@rt={{0x138}, {0x6, [0x5, 0xd4], 0x5, 0x32, 0x1, [@ipv4={'\x00', '\xff\xff', @loopback}, @loopback, @mcast2, @loopback, @loopback, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @empty, @local, @remote, @local, @dev={0xfe, 0x80, '\x00', 0x36}], 0xd}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7f, 0xed, {0x4}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32=r2, @ANYBLOB="f4b60000080000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xdab}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000a40)={{0xa, 0x1, 0x6, 0xffffff09, 'syz0\x00', 0x10001}, 0x1, [0x4, 0x6, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0xffff, 0x1, 0x5, 0x10000, 0x7, 0x80000000, 0xffffffff, 0x0, 0x80000001, 0x5, 0x8000000000000000, 0x9, 0x6, 0x9, 0xaa73, 0x612, 0x1, 0x62, 0xffffffffffffffff, 0x7fffffffffffffff, 0x5, 0x0, 0x6, 0x5, 0x0, 0x2, 0x2, 0x81, 0x6fa, 0x6, 0x18000000000000, 0x9, 0x2, 0x7ff, 0x9, 0x7fffffff, 0x7fffffffffffffff, 0x2, 0x4, 0x50952cf4, 0x1ffc00000, 0x6, 0x10000, 0xffffffff, 0x620a, 0x4, 0x6, 0x8000000000000000, 0x3, 0x6, 0xc787, 0x1, 0x0, 0x6, 0x10001, 0x80000000, 0xfe6, 0x5, 0x4, 0x0, 0x5, 0x40, 0x8c4b, 0x1000, 0x2906, 0x2d346fdc, 0x3f, 0x3, 0x2, 0x3f, 0x8, 0xdb, 0xfff, 0x1, 0x3, 0x2, 0x9, 0x2, 0x4, 0x3f, 0x6, 0x80000001, 0xffffffffffff7fff, 0x1, 0x200, 0x1ae70bbe, 0x100, 0x37, 0x86, 0x0, 0x200, 0xed6, 0x8000, 0x6, 0x3, 0x7, 0x0, 0xffffffffffffffc1, 0xfffffffffffffffc, 0x2, 0x2050, 0x100000001, 0x5, 0xfffffffffffffb3f, 0x8, 0x4b8e, 0x3, 0x1, 0x7fffffffffffffff, 0xd, 0x7, 0x80000000, 0x9, 0x40, 0x6, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x1000, 0xfff, 0x2]}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) clock_gettime(0x6, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000900)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @remote}, @ib={0x1b, 0x7, 0xaa4, {"6549d6f6eb43236d6d3e2f45ef8343fd"}, 0x40, 0xfffffffffffffffe, 0x1}}}, 0x118) [ 3006.930618] Process accounting resumed 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000400)=0x1) r1 = getuid() mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x10020, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffffffffffffffd7}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, ')-{{{-'}}, {@audit}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '#'}}, {@smackfsfloor}]}}) ioctl$RTC_WIE_ON(r0, 0x700f) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0xa0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000400)=0x1) (async) getuid() (async) mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x10020, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffffffffffffffd7}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, ')-{{{-'}}, {@audit}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '#'}}, {@smackfsfloor}]}}) (async) ioctl$RTC_WIE_ON(r0, 0x700f) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0xa0) (async) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) (async) 21:37:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x540, 0xffffffff, 0x228, 0xe8, 0x0, 0xffffffff, 0xffffffff, 0x470, 0x470, 0x470, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@empty, @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xffffff00], 'bond0\x00', 'vcan0\x00', {}, {}, 0x67, 0x0, 0x1, 0x10}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0xaf, {0x20}}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, [0x5398a1f8cebdfdbd, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xff000000, 0xffffffff], 'batadv_slave_1\x00', 'xfrm0\x00', {0xff}, {}, 0x33, 0x8, 0x4, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@hl={{0x28}, {0x0, 0x9}}, @common=@eui64={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0xd74c}}}}, {{@uncond, 0x0, 0x208, 0x248, 0x0, {}, [@common=@unspec=@addrtype1={{0x28}, {0xc4, 0x50, 0x2}}, @common=@rt={{0x138}, {0x6, [0x5, 0xd4], 0x5, 0x32, 0x1, [@ipv4={'\x00', '\xff\xff', @loopback}, @loopback, @mcast2, @loopback, @loopback, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @empty, @local, @remote, @local, @dev={0xfe, 0x80, '\x00', 0x36}], 0xd}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7f, 0xed, {0x4}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32=r2, @ANYBLOB="f4b60000080000002e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xdab}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000a40)={{0xa, 0x1, 0x6, 0xffffff09, 'syz0\x00', 0x10001}, 0x1, [0x4, 0x6, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0xffff, 0x1, 0x5, 0x10000, 0x7, 0x80000000, 0xffffffff, 0x0, 0x80000001, 0x5, 0x8000000000000000, 0x9, 0x6, 0x9, 0xaa73, 0x612, 0x1, 0x62, 0xffffffffffffffff, 0x7fffffffffffffff, 0x5, 0x0, 0x6, 0x5, 0x0, 0x2, 0x2, 0x81, 0x6fa, 0x6, 0x18000000000000, 0x9, 0x2, 0x7ff, 0x9, 0x7fffffff, 0x7fffffffffffffff, 0x2, 0x4, 0x50952cf4, 0x1ffc00000, 0x6, 0x10000, 0xffffffff, 0x620a, 0x4, 0x6, 0x8000000000000000, 0x3, 0x6, 0xc787, 0x1, 0x0, 0x6, 0x10001, 0x80000000, 0xfe6, 0x5, 0x4, 0x0, 0x5, 0x40, 0x8c4b, 0x1000, 0x2906, 0x2d346fdc, 0x3f, 0x3, 0x2, 0x3f, 0x8, 0xdb, 0xfff, 0x1, 0x3, 0x2, 0x9, 0x2, 0x4, 0x3f, 0x6, 0x80000001, 0xffffffffffff7fff, 0x1, 0x200, 0x1ae70bbe, 0x100, 0x37, 0x86, 0x0, 0x200, 0xed6, 0x8000, 0x6, 0x3, 0x7, 0x0, 0xffffffffffffffc1, 0xfffffffffffffffc, 0x2, 0x2050, 0x100000001, 0x5, 0xfffffffffffffb3f, 0x8, 0x4b8e, 0x3, 0x1, 0x7fffffffffffffff, 0xd, 0x7, 0x80000000, 0x9, 0x40, 0x6, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x1000, 0xfff, 0x2]}) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) clock_gettime(0x6, &(0x7f0000000240)) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000900)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @remote}, @ib={0x1b, 0x7, 0xaa4, {"6549d6f6eb43236d6d3e2f45ef8343fd"}, 0x40, 0xfffffffffffffffe, 0x1}}}, 0x118) 21:37:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) acct(&(0x7f0000000040)='./file0\x00') 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000400)=0x1) (async) r1 = getuid() mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x10020, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffffffffffffffd7}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, ')-{{{-'}}, {@audit}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '#'}}, {@smackfsfloor}]}}) (async) ioctl$RTC_WIE_ON(r0, 0x700f) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0xa0) (async) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) [ 3007.072775] Process accounting resumed 21:37:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x540, 0xffffffff, 0x228, 0xe8, 0x0, 0xffffffff, 0xffffffff, 0x470, 0x470, 0x470, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@empty, @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffffff, 0x0, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xffffff00], 'bond0\x00', 'vcan0\x00', {}, {}, 0x67, 0x0, 0x1, 0x10}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0xaf, {0x20}}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, [0x5398a1f8cebdfdbd, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xff000000, 0xffffffff], 'batadv_slave_1\x00', 'xfrm0\x00', {0xff}, {}, 0x33, 0x8, 0x4, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@hl={{0x28}, {0x0, 0x9}}, @common=@eui64={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0xd74c}}}}, {{@uncond, 0x0, 0x208, 0x248, 0x0, {}, [@common=@unspec=@addrtype1={{0x28}, {0xc4, 0x50, 0x2}}, @common=@rt={{0x138}, {0x6, [0x5, 0xd4], 0x5, 0x32, 0x1, [@ipv4={'\x00', '\xff\xff', @loopback}, @loopback, @mcast2, @loopback, @loopback, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, @empty, @local, @remote, @local, @dev={0xfe, 0x80, '\x00', 0x36}], 0xd}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x7f, 0xed, {0x4}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32=r2, @ANYBLOB="f4b60000080000002e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010400000100000018000000", @ANYRES32=r2, @ANYBLOB="f4b60000080000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xdab}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xdab}}, './file0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000a40)={{0xa, 0x1, 0x6, 0xffffff09, 'syz0\x00', 0x10001}, 0x1, [0x4, 0x6, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0xffff, 0x1, 0x5, 0x10000, 0x7, 0x80000000, 0xffffffff, 0x0, 0x80000001, 0x5, 0x8000000000000000, 0x9, 0x6, 0x9, 0xaa73, 0x612, 0x1, 0x62, 0xffffffffffffffff, 0x7fffffffffffffff, 0x5, 0x0, 0x6, 0x5, 0x0, 0x2, 0x2, 0x81, 0x6fa, 0x6, 0x18000000000000, 0x9, 0x2, 0x7ff, 0x9, 0x7fffffff, 0x7fffffffffffffff, 0x2, 0x4, 0x50952cf4, 0x1ffc00000, 0x6, 0x10000, 0xffffffff, 0x620a, 0x4, 0x6, 0x8000000000000000, 0x3, 0x6, 0xc787, 0x1, 0x0, 0x6, 0x10001, 0x80000000, 0xfe6, 0x5, 0x4, 0x0, 0x5, 0x40, 0x8c4b, 0x1000, 0x2906, 0x2d346fdc, 0x3f, 0x3, 0x2, 0x3f, 0x8, 0xdb, 0xfff, 0x1, 0x3, 0x2, 0x9, 0x2, 0x4, 0x3f, 0x6, 0x80000001, 0xffffffffffff7fff, 0x1, 0x200, 0x1ae70bbe, 0x100, 0x37, 0x86, 0x0, 0x200, 0xed6, 0x8000, 0x6, 0x3, 0x7, 0x0, 0xffffffffffffffc1, 0xfffffffffffffffc, 0x2, 0x2050, 0x100000001, 0x5, 0xfffffffffffffb3f, 0x8, 0x4b8e, 0x3, 0x1, 0x7fffffffffffffff, 0xd, 0x7, 0x80000000, 0x9, 0x40, 0x6, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x1000, 0xfff, 0x2]}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) clock_gettime(0x6, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000900)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @remote}, @ib={0x1b, 0x7, 0xaa4, {"6549d6f6eb43236d6d3e2f45ef8343fd"}, 0x40, 0xfffffffffffffffe, 0x1}}}, 0x118) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r1, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r1, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x0, 0x1f, 0xda, 0x2, 0x45, @private0={0xfc, 0x0, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x8000, 0x2, 0x2}}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000400)=0x1) r1 = getuid() mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x10020, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffffffffffffffd7}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, ')-{{{-'}}, {@audit}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, '#'}}, {@smackfsfloor}]}}) ioctl$RTC_WIE_ON(r0, 0x700f) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}}, 0xa0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000100)='./file0\x00', 0x81, 0x161) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) [ 3007.182536] Process accounting resumed 21:37:00 executing program 5: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x4}}, 0x18) r0 = open(&(0x7f0000000080)='./file0\x00', 0x230742, 0x41) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x680, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x2, {"7550010dc43b4bd0a99b84d134ca0d58"}, 0x7f, 0x327, 0x7fffffff}, @in={0x2, 0x4e20, @local}}}, 0x118) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) acct(&(0x7f0000000040)='./file0\x00') 21:37:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r1, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r1, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x0, 0x1f, 0xda, 0x2, 0x45, @private0={0xfc, 0x0, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x8000, 0x2, 0x2}}) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000100)='./file0\x00', 0x81, 0x161) (async) open(&(0x7f0000000100)='./file0\x00', 0x81, 0x161) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 21:37:00 executing program 5: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x4}}, 0x18) r0 = open(&(0x7f0000000080)='./file0\x00', 0x230742, 0x41) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x680, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x2, {"7550010dc43b4bd0a99b84d134ca0d58"}, 0x7f, 0x327, 0x7fffffff}, @in={0x2, 0x4e20, @local}}}, 0x118) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000100)='./file0\x00', 0x81, 0x161) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) 21:37:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'syztnl0\x00', r1, 0x2f, 0x1, 0x4, 0x65f, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x8, 0x40, 0x81}}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'syztnl1\x00', r1, 0x29, 0x1, 0x0, 0x400, 0x42, @empty, @remote, 0x1c8425bf5db8f29d, 0x0, 0xe525}}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r1, 0x0, 0x1f, 0xda, 0x2, 0x45, @private0={0xfc, 0x0, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x8000, 0x2, 0x2}}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) open(&(0x7f0000000100)='./file0\x00', 0x81, 0x161) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) [ 3007.404103] Process accounting resumed 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) 21:37:00 executing program 5: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x4}}, 0x18) r0 = open(&(0x7f0000000080)='./file0\x00', 0x230742, 0x41) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x680, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x2, {"7550010dc43b4bd0a99b84d134ca0d58"}, 0x7f, 0x327, 0x7fffffff}, @in={0x2, 0x4e20, @local}}}, 0x118) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x4}}, 0x18) (async) open(&(0x7f0000000080)='./file0\x00', 0x230742, 0x41) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) open(&(0x7f0000000040)='./file0/../file0\x00', 0x680, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x2, {"7550010dc43b4bd0a99b84d134ca0d58"}, 0x7f, 0x327, 0x7fffffff}, @in={0x2, 0x4e20, @local}}}, 0x118) (async) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x79}, 0x0, &(0x7f0000000180)={0x8, 0x1}, &(0x7f0000000200), 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0xa) renameat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') 21:37:00 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000100000018000000", @ANYRES32=r1, @ANYBLOB="02000000000000002e2f66696c653000"]) 21:37:00 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) 21:37:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x79}, 0x0, &(0x7f0000000180)={0x8, 0x1}, &(0x7f0000000200), 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0xa) renameat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x79}, 0x0, &(0x7f0000000180)={0x8, 0x1}, &(0x7f0000000200), 0x0) (async) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0xa) (async) renameat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') (async) 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000100000018000000", @ANYRES32=r1, @ANYBLOB="02000000000000002e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000100000018000000", @ANYRES32=r1, @ANYBLOB="02000000000000002e2f66696c653000"]) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) (async) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x6bcf02, 0x50) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4580, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x82, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_IOCTL(r3, &(0x7f00000004c0)={0x20, 0x0, r5, {0x75db, 0x0, 0x4, 0xfffffff8}}, 0x20) r6 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r7 = getuid() r8 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8]) r9 = getuid() r10 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r11 = getuid() r12 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fdH', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r11, @ANYBLOB=',group_id=', @ANYRESDEC=r12]) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)={0x2d0, 0xfffffffffffffff5, 0x0, [{{0x2, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0x0, {0x5, 0x7fff, 0x9, 0x400, 0x3, 0x2, 0x6, 0x1ff, 0x3ff, 0xc000, 0x7d54, r2, r8, 0x1f, 0x7}}, {0x5, 0x1f, 0x14, 0x3, 'security.capability\x00'}}, {{0x3, 0x2, 0x1, 0x4a1, 0x5, 0x50a7, {0x0, 0x6, 0x8000, 0x2, 0x4, 0x4, 0x10000, 0xb388, 0x9, 0x8000, 0xffff, r9, 0xffffffffffffffff, 0x1000, 0x51}}, {0x4, 0x6, 0x14, 0x2, 'security.capability\x00'}}, {{0x5, 0x0, 0x3, 0x9, 0x9, 0x7ff, {0x1, 0x7ff, 0x2, 0xfffffffffffffff8, 0x1, 0x100000001, 0x8001, 0x5, 0x0, 0xc000, 0x1, r11, 0xffffffffffffffff, 0x2, 0xa3e1}}, {0x5, 0x2821, 0x14, 0x2, 'security.capability\x00'}}, {{0x6, 0x0, 0x6, 0x0, 0x9, 0x561, {0x1, 0x1, 0x10000, 0x3, 0x100, 0x9, 0xe42, 0x1ff, 0x4, 0x6000, 0x9, 0x0, r15, 0x10000, 0x6}}, {0x1, 0xffffffffffffffff, 0x14, 0x6, 'security.capability\x00'}}]}, 0x2d0) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async, rerun: 64) pselect6(0x40, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x79}, 0x0, &(0x7f0000000180)={0x8, 0x1}, &(0x7f0000000200), 0x0) (rerun: 64) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0xa) renameat(r0, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00') 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100000100000018000000", @ANYRES32=r1, @ANYBLOB="02000000000000002e2f66696c653000"]) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) 21:37:00 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="6c65300001e2961c57e2fc951ad3b60a5ab217b47b000000160312a625d1fb0af9073d910e5dee136be0df27f1679c454e888c6a11804bffffaf562aad23eaf75d4f1eb63f4a86befd8cd73818be6cfa34507a"]) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f00000003c0)={{}, {0x401}, 0x8, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="0cef196590dbed7dd14281b0bb8d4076be3cea3d40c7256bc42cd87728140989e387ad2d50d7a2bdc9cf2f09804f2b47aa7e1d04fb2aec43d85d5f33047b61b640d788e8a86f486d86805c590f22dadc188bbcd12f530818020bfb692cc5a5989fa12c", 0x63, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000b1000000000000000c85000057f78c1837dd2ce014d3fbe0cfdefe468c43ec9eddc491c6a51868298d7f5181cb269b82b7676aca1880ae5d8df355afabe90bb2f2b5a8500e6e59c2fb0df33685fe0e98f65bdfe86e94af065b4eef1d02a774e1c178974d235158ee197024b183fa216be32ba274388a4e9bc388e4471ed03503beb58b317f783311b3a0a43d70b651aad11f000000ba23fe5c69000079ae1c1d17838c70e00bb71f1b092beda629291fc2e8220b04883a1772cd55c244bb148be1cfae4da8fb85ac87477d67f8d0f062d011a53426018f136ca31ff9b09048fecac918c200"/245], 0x114}) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x6bcf02, 0x50) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4580, 0x0) (async, rerun: 64) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x82, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) (async) write$FUSE_IOCTL(r3, &(0x7f00000004c0)={0x20, 0x0, r5, {0x75db, 0x0, 0x4, 0xfffffff8}}, 0x20) (async, rerun: 64) r6 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async, rerun: 64) r7 = getuid() (async, rerun: 64) r8 = getgid() (rerun: 64) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8]) r9 = getuid() (async, rerun: 64) r10 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async, rerun: 64) r11 = getuid() r12 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fdH', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r11, @ANYBLOB=',group_id=', @ANYRESDEC=r12]) (async) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() (async) r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)={0x2d0, 0xfffffffffffffff5, 0x0, [{{0x2, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0x0, {0x5, 0x7fff, 0x9, 0x400, 0x3, 0x2, 0x6, 0x1ff, 0x3ff, 0xc000, 0x7d54, r2, r8, 0x1f, 0x7}}, {0x5, 0x1f, 0x14, 0x3, 'security.capability\x00'}}, {{0x3, 0x2, 0x1, 0x4a1, 0x5, 0x50a7, {0x0, 0x6, 0x8000, 0x2, 0x4, 0x4, 0x10000, 0xb388, 0x9, 0x8000, 0xffff, r9, 0xffffffffffffffff, 0x1000, 0x51}}, {0x4, 0x6, 0x14, 0x2, 'security.capability\x00'}}, {{0x5, 0x0, 0x3, 0x9, 0x9, 0x7ff, {0x1, 0x7ff, 0x2, 0xfffffffffffffff8, 0x1, 0x100000001, 0x8001, 0x5, 0x0, 0xc000, 0x1, r11, 0xffffffffffffffff, 0x2, 0xa3e1}}, {0x5, 0x2821, 0x14, 0x2, 'security.capability\x00'}}, {{0x6, 0x0, 0x6, 0x0, 0x9, 0x561, {0x1, 0x1, 0x10000, 0x3, 0x100, 0x9, 0xe42, 0x1ff, 0x4, 0x6000, 0x9, 0x0, r15, 0x10000, 0x6}}, {0x1, 0xffffffffffffffff, 0x14, 0x6, 'security.capability\x00'}}]}, 0x2d0) 21:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000140)=0x6e, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x80000) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/254, 0xfe) bpf$LINK_DETACH(0x22, &(0x7f0000000100), 0x4) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'team0\x00'}) 21:37:00 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 1) 21:37:00 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:00 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:00 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="6c65300001e2961c57e2fc951ad3b60a5ab217b47b000000160312a625d1fb0af9073d910e5dee136be0df27f1679c454e888c6a11804bffffaf562aad23eaf75d4f1eb63f4a86befd8cd73818be6cfa34507a"]) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f00000003c0)={{}, {0x401}, 0x8, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="0cef196590dbed7dd14281b0bb8d4076be3cea3d40c7256bc42cd87728140989e387ad2d50d7a2bdc9cf2f09804f2b47aa7e1d04fb2aec43d85d5f33047b61b640d788e8a86f486d86805c590f22dadc188bbcd12f530818020bfb692cc5a5989fa12c", 0x63, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000b1000000000000000c85000057f78c1837dd2ce014d3fbe0cfdefe468c43ec9eddc491c6a51868298d7f5181cb269b82b7676aca1880ae5d8df355afabe90bb2f2b5a8500e6e59c2fb0df33685fe0e98f65bdfe86e94af065b4eef1d02a774e1c178974d235158ee197024b183fa216be32ba274388a4e9bc388e4471ed03503beb58b317f783311b3a0a43d70b651aad11f000000ba23fe5c69000079ae1c1d17838c70e00bb71f1b092beda629291fc2e8220b04883a1772cd55c244bb148be1cfae4da8fb85ac87477d67f8d0f062d011a53426018f136ca31ff9b09048fecac918c200"/245], 0x114}) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="6c65300001e2961c57e2fc951ad3b60a5ab217b47b000000160312a625d1fb0af9073d910e5dee136be0df27f1679c454e888c6a11804bffffaf562aad23eaf75d4f1eb63f4a86befd8cd73818be6cfa34507a"]) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) (async) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f00000003c0)={{}, {0x401}, 0x8, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="0cef196590dbed7dd14281b0bb8d4076be3cea3d40c7256bc42cd87728140989e387ad2d50d7a2bdc9cf2f09804f2b47aa7e1d04fb2aec43d85d5f33047b61b640d788e8a86f486d86805c590f22dadc188bbcd12f530818020bfb692cc5a5989fa12c", 0x63, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000b1000000000000000c85000057f78c1837dd2ce014d3fbe0cfdefe468c43ec9eddc491c6a51868298d7f5181cb269b82b7676aca1880ae5d8df355afabe90bb2f2b5a8500e6e59c2fb0df33685fe0e98f65bdfe86e94af065b4eef1d02a774e1c178974d235158ee197024b183fa216be32ba274388a4e9bc388e4471ed03503beb58b317f783311b3a0a43d70b651aad11f000000ba23fe5c69000079ae1c1d17838c70e00bb71f1b092beda629291fc2e8220b04883a1772cd55c244bb148be1cfae4da8fb85ac87477d67f8d0f062d011a53426018f136ca31ff9b09048fecac918c200"/245], 0x114}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) (async) 21:37:00 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x6bcf02, 0x50) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x4580, 0x0) (async) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x82, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000002080)={0x28, 0xfffffffffffffff5, r5, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_IOCTL(r3, &(0x7f00000004c0)={0x20, 0x0, r5, {0x75db, 0x0, 0x4, 0xfffffff8}}, 0x20) (async) r6 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r7 = getuid() r8 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_id=', @ANYRESDEC=r8]) (async) r9 = getuid() (async) r10 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r11 = getuid() (async) r12 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fdH', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r11, @ANYBLOB=',group_id=', @ANYRESDEC=r12]) (async) r13 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r14 = getuid() r15 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r14, @ANYBLOB=',group_id=', @ANYRESDEC=r15]) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)={0x2d0, 0xfffffffffffffff5, 0x0, [{{0x2, 0x3, 0x2, 0xfffffffffffffffc, 0x3, 0x0, {0x5, 0x7fff, 0x9, 0x400, 0x3, 0x2, 0x6, 0x1ff, 0x3ff, 0xc000, 0x7d54, r2, r8, 0x1f, 0x7}}, {0x5, 0x1f, 0x14, 0x3, 'security.capability\x00'}}, {{0x3, 0x2, 0x1, 0x4a1, 0x5, 0x50a7, {0x0, 0x6, 0x8000, 0x2, 0x4, 0x4, 0x10000, 0xb388, 0x9, 0x8000, 0xffff, r9, 0xffffffffffffffff, 0x1000, 0x51}}, {0x4, 0x6, 0x14, 0x2, 'security.capability\x00'}}, {{0x5, 0x0, 0x3, 0x9, 0x9, 0x7ff, {0x1, 0x7ff, 0x2, 0xfffffffffffffff8, 0x1, 0x100000001, 0x8001, 0x5, 0x0, 0xc000, 0x1, r11, 0xffffffffffffffff, 0x2, 0xa3e1}}, {0x5, 0x2821, 0x14, 0x2, 'security.capability\x00'}}, {{0x6, 0x0, 0x6, 0x0, 0x9, 0x561, {0x1, 0x1, 0x10000, 0x3, 0x100, 0x9, 0xe42, 0x1ff, 0x4, 0x6000, 0x9, 0x0, r15, 0x10000, 0x6}}, {0x1, 0xffffffffffffffff, 0x14, 0x6, 'security.capability\x00'}}]}, 0x2d0) 21:37:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) [ 3007.991483] FAULT_INJECTION: forcing a failure. [ 3007.991483] name failslab, interval 1, probability 0, space 0, times 0 [ 3008.003249] CPU: 1 PID: 27616 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3008.011193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3008.020563] Call Trace: [ 3008.023238] dump_stack+0x1b2/0x281 [ 3008.027024] should_fail.cold+0x10a/0x149 [ 3008.031192] should_failslab+0xd6/0x130 [ 3008.035177] __kmalloc_track_caller+0x2bc/0x400 [ 3008.039843] ? strndup_user+0x5b/0xf0 [ 3008.043640] memdup_user+0x22/0xa0 [ 3008.047189] strndup_user+0x5b/0xf0 [ 3008.050834] ? copy_mnt_ns+0xa30/0xa30 [ 3008.054744] SyS_mount+0x39/0x120 [ 3008.058192] ? copy_mnt_ns+0xa30/0xa30 [ 3008.062109] do_syscall_64+0x1d5/0x640 [ 3008.066089] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3008.071277] RIP: 0033:0x7fb7803d00f9 [ 3008.074981] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3008.082681] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 21:37:01 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000140)=0x6e, 0x0) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x80000) (async) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/254, 0xfe) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000100), 0x4) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'team0\x00'}) 21:37:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 2) 21:37:01 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) (async) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="6c65300001e2961c57e2fc951ad3b60a5ab217b47b000000160312a625d1fb0af9073d910e5dee136be0df27f1679c454e888c6a11804bffffaf562aad23eaf75d4f1eb63f4a86befd8cd73818be6cfa34507a"]) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f00000003c0)={{}, {0x401}, 0x8, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="0cef196590dbed7dd14281b0bb8d4076be3cea3d40c7256bc42cd87728140989e387ad2d50d7a2bdc9cf2f09804f2b47aa7e1d04fb2aec43d85d5f33047b61b640d788e8a86f486d86805c590f22dadc188bbcd12f530818020bfb692cc5a5989fa12c", 0x63, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="02000000b1000000000000000c85000057f78c1837dd2ce014d3fbe0cfdefe468c43ec9eddc491c6a51868298d7f5181cb269b82b7676aca1880ae5d8df355afabe90bb2f2b5a8500e6e59c2fb0df33685fe0e98f65bdfe86e94af065b4eef1d02a774e1c178974d235158ee197024b183fa216be32ba274388a4e9bc388e4471ed03503beb58b317f783311b3a0a43d70b651aad11f000000ba23fe5c69000079ae1c1d17838c70e00bb71f1b092beda629291fc2e8220b04883a1772cd55c244bb148be1cfae4da8fb85ac87477d67f8d0f062d011a53426018f136ca31ff9b09048fecac918c200"/245], 0x114}) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) [ 3008.089944] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3008.097204] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3008.104497] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3008.111759] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:01 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xfffffffffffffff7}}, './file1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1ff}}, './file0\x00'}) 21:37:01 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:37:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x3, @local, 0x7}, r3}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r3}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x1ff, "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", 0xff, 0x9, 0x3, 0x1f, 0x0, 0x80, 0x9}, r3}}, 0x128) 21:37:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000140)=0x6e, 0x0) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000020c0)) (async) accept4$unix(r1, 0x0, &(0x7f0000000000), 0x80000) (async) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/254, 0xfe) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000100), 0x4) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'team0\x00'}) [ 3008.262667] FAULT_INJECTION: forcing a failure. [ 3008.262667] name failslab, interval 1, probability 0, space 0, times 0 [ 3008.278776] CPU: 1 PID: 27649 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3008.286693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3008.296059] Call Trace: [ 3008.298649] dump_stack+0x1b2/0x281 [ 3008.302280] should_fail.cold+0x10a/0x149 [ 3008.306432] should_failslab+0xd6/0x130 [ 3008.310418] __kmalloc_track_caller+0x2bc/0x400 [ 3008.315084] ? strndup_user+0x5b/0xf0 [ 3008.318882] memdup_user+0x22/0xa0 [ 3008.322416] strndup_user+0x5b/0xf0 [ 3008.326032] ? copy_mnt_ns+0xa30/0xa30 [ 3008.329914] SyS_mount+0x68/0x120 [ 3008.333357] ? copy_mnt_ns+0xa30/0xa30 [ 3008.337237] do_syscall_64+0x1d5/0x640 [ 3008.341138] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3008.346348] RIP: 0033:0x7fb7803d00f9 [ 3008.350147] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:37:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 3) [ 3008.357845] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3008.365129] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3008.372395] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3008.379750] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3008.387110] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x3, @local, 0x7}, r3}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x1ff, "01c901a1d7915c98584157b47c3d478a2184ad8207f505b1be391a00f05831b0b75c9730eaa7bc31273c01206ad1c8f740108a9b0f92be5e2b570764c9cd2acb9ae97284b45939acd971679f99951bb812faacffe1d3d3f4e9ec7c1dfdba18a089681a8ccdee0c0ade28cc8c292b73b065bee29d0fefae2fc1fa8d326752891c1e0cc4b6eb1134d2a0904a26a5650bf1eb5e5374c0787ff1c11934644281576ccd13e259f74b10ebd54ae6b3a48c60875d43bfda18e8d31dbdb470fdbc5f222cf8ed02893754345352ca908d5982a0c09444a67613604eb633b3102baf0e8186dd830495b8fae8769ad850a4ac8e61fb38dbbe8942cf1b1cd9e65ab16ea68a18", 0xff, 0x9, 0x3, 0x1f, 0x0, 0x80, 0x9}, r3}}, 0x128) 21:37:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:01 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xfffffffffffffff7}}, './file1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1ff}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1ff}}, './file0\x00'}) [ 3008.487533] FAULT_INJECTION: forcing a failure. [ 3008.487533] name failslab, interval 1, probability 0, space 0, times 0 [ 3008.500644] CPU: 1 PID: 27668 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3008.508553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3008.517922] Call Trace: [ 3008.520551] dump_stack+0x1b2/0x281 [ 3008.524195] should_fail.cold+0x10a/0x149 [ 3008.528342] should_failslab+0xd6/0x130 [ 3008.532317] kmem_cache_alloc+0x28e/0x3c0 [ 3008.536469] getname_flags+0xc8/0x550 [ 3008.540282] user_path_at_empty+0x2a/0x50 [ 3008.544449] do_mount+0x118/0x2a30 [ 3008.548015] ? lock_acquire+0x170/0x3f0 [ 3008.552024] ? lock_downgrade+0x740/0x740 [ 3008.556174] ? copy_mount_string+0x40/0x40 [ 3008.560418] ? __might_fault+0x177/0x1b0 [ 3008.564483] ? _copy_from_user+0xb3/0x100 [ 3008.568631] ? copy_mount_options+0x1fa/0x2f0 [ 3008.573132] ? copy_mnt_ns+0xa30/0xa30 [ 3008.577042] SyS_mount+0xa8/0x120 [ 3008.580523] ? copy_mnt_ns+0xa30/0xa30 [ 3008.584414] do_syscall_64+0x1d5/0x640 [ 3008.588315] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3008.593497] RIP: 0033:0x7fb7803d00f9 [ 3008.597982] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3008.605771] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3008.613036] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3008.620295] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3008.627554] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 21:37:01 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x400, 0x3}}}, 0x28) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 21:37:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0xfffffffffffffdd7, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200), 0x0) 21:37:01 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 4) [ 3008.634829] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:01 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x3, @local, 0x7}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x3, @local, 0x7}, r3}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r3}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x1ff, "01c901a1d7915c98584157b47c3d478a2184ad8207f505b1be391a00f05831b0b75c9730eaa7bc31273c01206ad1c8f740108a9b0f92be5e2b570764c9cd2acb9ae97284b45939acd971679f99951bb812faacffe1d3d3f4e9ec7c1dfdba18a089681a8ccdee0c0ade28cc8c292b73b065bee29d0fefae2fc1fa8d326752891c1e0cc4b6eb1134d2a0904a26a5650bf1eb5e5374c0787ff1c11934644281576ccd13e259f74b10ebd54ae6b3a48c60875d43bfda18e8d31dbdb470fdbc5f222cf8ed02893754345352ca908d5982a0c09444a67613604eb633b3102baf0e8186dd830495b8fae8769ad850a4ac8e61fb38dbbe8942cf1b1cd9e65ab16ea68a18", 0xff, 0x9, 0x3, 0x1f, 0x0, 0x80, 0x9}, r3}}, 0x128) 21:37:01 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xfffffffffffffff7}}, './file1\x00'}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x1ff}}, './file0\x00'}) 21:37:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0xfffffffffffffdd7, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200), 0x0) 21:37:01 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x400, 0x3}}}, 0x28) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) [ 3008.759546] FAULT_INJECTION: forcing a failure. [ 3008.759546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3008.771391] CPU: 1 PID: 27692 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3008.779285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3008.788728] Call Trace: [ 3008.791324] dump_stack+0x1b2/0x281 [ 3008.794955] should_fail.cold+0x10a/0x149 [ 3008.799103] __alloc_pages_nodemask+0x21e/0x2900 [ 3008.803868] ? is_bpf_text_address+0x91/0x150 [ 3008.808370] ? __lock_acquire+0x5fc/0x3f20 [ 3008.812610] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3008.817497] ? kernel_text_address+0xbd/0xf0 [ 3008.821917] ? lock_downgrade+0x740/0x740 [ 3008.826144] ? __kernel_text_address+0x9/0x30 [ 3008.830630] ? unwind_get_return_address+0x51/0x90 [ 3008.835563] ? depot_save_stack+0x10d/0x3f0 [ 3008.839904] cache_grow_begin+0x91/0x700 [ 3008.843970] ? fs_reclaim_release+0xd0/0x110 [ 3008.848370] ? check_preemption_disabled+0x35/0x240 [ 3008.853376] cache_alloc_refill+0x273/0x350 [ 3008.857705] kmem_cache_alloc+0x333/0x3c0 [ 3008.861856] getname_flags+0xc8/0x550 [ 3008.865672] user_path_at_empty+0x2a/0x50 [ 3008.869820] do_mount+0x118/0x2a30 [ 3008.873355] ? lock_acquire+0x170/0x3f0 [ 3008.877337] ? lock_downgrade+0x740/0x740 [ 3008.881494] ? copy_mount_string+0x40/0x40 [ 3008.885719] ? __might_fault+0x177/0x1b0 [ 3008.889780] ? _copy_from_user+0xb3/0x100 [ 3008.893942] ? copy_mount_options+0x1fa/0x2f0 [ 3008.898457] ? copy_mnt_ns+0xa30/0xa30 [ 3008.902341] SyS_mount+0xa8/0x120 [ 3008.905807] ? copy_mnt_ns+0xa30/0xa30 [ 3008.909701] do_syscall_64+0x1d5/0x640 [ 3008.913588] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3008.918786] RIP: 0033:0x7fb7803d00f9 [ 3008.922489] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3008.930192] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3008.937478] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3008.944752] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3008.952561] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 21:37:02 executing program 3: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) 21:37:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 5) [ 3008.959850] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1, 0x4, &(0x7f0000000040)}) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 3: prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) 21:37:02 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x400, 0x3}}}, 0x28) (async) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 21:37:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0xfffffffffffffdd7, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200), 0x0) (async) pselect6(0xfffffffffffffdd7, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200), 0x0) [ 3009.093933] FAULT_INJECTION: forcing a failure. [ 3009.093933] name failslab, interval 1, probability 0, space 0, times 0 [ 3009.106465] CPU: 0 PID: 27713 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3009.114419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3009.123786] Call Trace: [ 3009.126396] dump_stack+0x1b2/0x281 [ 3009.130051] should_fail.cold+0x10a/0x149 [ 3009.134222] should_failslab+0xd6/0x130 [ 3009.138225] kmem_cache_alloc+0x28e/0x3c0 [ 3009.142401] alloc_vfsmnt+0x23/0x7f0 [ 3009.146157] ? _raw_read_unlock+0x29/0x40 [ 3009.150328] vfs_kern_mount.part.0+0x27/0x470 [ 3009.154848] do_mount+0xe65/0x2a30 [ 3009.158407] ? lock_acquire+0x170/0x3f0 [ 3009.162395] ? lock_downgrade+0x740/0x740 [ 3009.166561] ? copy_mount_string+0x40/0x40 [ 3009.170818] ? __might_fault+0x177/0x1b0 [ 3009.174892] ? _copy_from_user+0xb3/0x100 [ 3009.179053] ? copy_mount_options+0x1fa/0x2f0 [ 3009.183573] ? copy_mnt_ns+0xa30/0xa30 [ 3009.187474] SyS_mount+0xa8/0x120 [ 3009.190942] ? copy_mnt_ns+0xa30/0xa30 [ 3009.194845] do_syscall_64+0x1d5/0x640 [ 3009.198750] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3009.203949] RIP: 0033:0x7fb7803d00f9 [ 3009.207678] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3009.215414] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3009.222699] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3009.229979] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3009.237262] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 21:37:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x10000}, {0xfffffffc, 0xee1}]}, 0x14, 0x1) 21:37:02 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r2}}}, 0x28) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1, 0x4, &(0x7f0000000040)}) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1, 0x4, &(0x7f0000000040)}) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) [ 3009.244576] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x10000}, {0xfffffffc, 0xee1}]}, 0x14, 0x1) (async) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x10000}, {0xfffffffc, 0xee1}]}, 0x14, 0x1) 21:37:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xb}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@uid_lt}]}}) 21:37:02 executing program 3: prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, 0x0, 0x0) 21:37:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 6) 21:37:02 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1, 0x4, &(0x7f0000000040)}) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r2}}}, 0x28) 21:37:02 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r2}}}, 0x28) 21:37:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r2, 0xffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @private0, 0x785}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) prctl$PR_SET_KEEPCAPS(0x8, 0xfffbfffffffffffd) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r3, 0x0, 0x0) [ 3009.389714] FAULT_INJECTION: forcing a failure. [ 3009.389714] name failslab, interval 1, probability 0, space 0, times 0 [ 3009.419597] CPU: 0 PID: 27742 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3009.427518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3009.436900] Call Trace: [ 3009.439512] dump_stack+0x1b2/0x281 [ 3009.443203] should_fail.cold+0x10a/0x149 [ 3009.447383] should_failslab+0xd6/0x130 [ 3009.451392] kmem_cache_alloc+0x28e/0x3c0 [ 3009.455688] getname_kernel+0x4e/0x340 [ 3009.459601] kern_path+0x1b/0x40 [ 3009.462986] lookup_bdev+0xc6/0x1c0 [ 3009.466637] ? bd_acquire+0x440/0x440 [ 3009.470458] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3009.475930] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3009.480976] blkdev_get_by_path+0x1b/0xa0 [ 3009.485155] mount_bdev+0x4c/0x360 [ 3009.488713] ? fuse_get_root_inode+0xc0/0xc0 [ 3009.493180] mount_fs+0x92/0x2a0 [ 3009.496603] vfs_kern_mount.part.0+0x5b/0x470 [ 3009.501127] do_mount+0xe65/0x2a30 [ 3009.504691] ? lock_acquire+0x170/0x3f0 [ 3009.508688] ? lock_downgrade+0x740/0x740 [ 3009.512857] ? copy_mount_string+0x40/0x40 [ 3009.517105] ? __might_fault+0x177/0x1b0 [ 3009.521185] ? _copy_from_user+0xb3/0x100 [ 3009.525356] ? copy_mount_options+0x1fa/0x2f0 [ 3009.529868] ? copy_mnt_ns+0xa30/0xa30 [ 3009.533780] SyS_mount+0xa8/0x120 [ 3009.537246] ? copy_mnt_ns+0xa30/0xa30 [ 3009.541160] do_syscall_64+0x1d5/0x640 [ 3009.545074] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3009.550280] RIP: 0033:0x7fb7803d00f9 [ 3009.554173] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3009.561902] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3009.569295] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3009.576584] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 21:37:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x10000}, {0xfffffffc, 0xee1}]}, 0x14, 0x1) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x400, 0x3}}}, 0x28) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r2, 0xffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @private0, 0x785}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) (async) prctl$PR_SET_KEEPCAPS(0x8, 0xfffbfffffffffffd) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r3, 0x0, 0x0) 21:37:02 executing program 4: ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000240)={{'\x00', 0x2}, {0x1f}, 0x40, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="efe51523ec70d36cc0abad6d94f662ce61a78582864699f6b6c7f100fd5cedb80d310b7ebb6800bdd99205c76e40b0016ba4bbf3c85df4c9c946ab41b2478a04e2fc3236d1f25114892473db4701f1e9e5d14fa9193c9f88b0b5b8cd1bc01924882e42dbf453271b2c59b64d66bd213b5641bc02e985713b081a1215908d4c", 0x7f, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x108}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffffffffffc}, 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200)={r0, r1+60000000}, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x8000, 0x200, 0xff0, 0x8, 0x3, 0x45fe, 0x6, 0x4}, &(0x7f00000002c0)={0x1, 0xd4, 0x53, 0x1f, 0x9, 0x7fffffffffffffff, 0x9, 0x1}, &(0x7f0000000480)={0x1, 0x70, 0x80000000, 0x0, 0x8e, 0xfffffffffffffff8, 0x1, 0xffffffff}, &(0x7f00000004c0), &(0x7f0000000540)={&(0x7f0000000500)={[0x7ff]}, 0x8}) [ 3009.583868] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3009.591295] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:02 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r2}}}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) syz_open_dev$sndctrl(&(0x7f0000000100), 0x6, 0x1c0) (async) getpgid(0x0) (async) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x0, 0x5, 0x338, 0xfffffffb, 'syz1\x00', 0x3ff}, 0x4, 0x10, 0x200, r2, 0x3, 0x1, 'syz1\x00', &(0x7f0000000140)=['%\x00', '\x00', '/dev/nvram\x00'], 0xe}) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, r2}}}, 0x28) (async) 21:37:02 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 7) 21:37:02 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 1) 21:37:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r2, 0xffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @private0, 0x785}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) prctl$PR_SET_KEEPCAPS(0x8, 0xfffbfffffffffffd) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r3, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r2, 0xffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x9, @private0, 0x785}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) (async) prctl$PR_SET_KEEPCAPS(0x8, 0xfffbfffffffffffd) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, 0x0, 0x0) (async) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) (async, rerun: 32) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (rerun: 32) 21:37:02 executing program 5: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x401) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3009.752871] FAULT_INJECTION: forcing a failure. [ 3009.752871] name failslab, interval 1, probability 0, space 0, times 0 [ 3009.776783] CPU: 0 PID: 27786 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3009.784719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3009.794087] Call Trace: [ 3009.796699] dump_stack+0x1b2/0x281 [ 3009.800342] should_fail.cold+0x10a/0x149 [ 3009.804505] should_failslab+0xd6/0x130 [ 3009.808505] kmem_cache_alloc+0x28e/0x3c0 [ 3009.812670] getname_kernel+0x4e/0x340 [ 3009.816583] kern_path+0x1b/0x40 [ 3009.820016] lookup_bdev+0xc6/0x1c0 [ 3009.823670] ? bd_acquire+0x440/0x440 [ 3009.827493] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3009.832966] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3009.838010] blkdev_get_by_path+0x1b/0xa0 [ 3009.842191] mount_bdev+0x4c/0x360 [ 3009.845749] ? fuse_get_root_inode+0xc0/0xc0 [ 3009.850175] mount_fs+0x92/0x2a0 [ 3009.853565] vfs_kern_mount.part.0+0x5b/0x470 [ 3009.858075] do_mount+0xe65/0x2a30 [ 3009.861642] ? lock_acquire+0x170/0x3f0 [ 3009.865637] ? lock_downgrade+0x740/0x740 [ 3009.869807] ? copy_mount_string+0x40/0x40 [ 3009.874048] ? __might_fault+0x177/0x1b0 [ 3009.878115] ? _copy_from_user+0xb3/0x100 [ 3009.882280] ? copy_mount_options+0x1fa/0x2f0 [ 3009.886780] ? copy_mnt_ns+0xa30/0xa30 [ 3009.890684] SyS_mount+0xa8/0x120 [ 3009.894152] ? copy_mnt_ns+0xa30/0xa30 [ 3009.898053] do_syscall_64+0x1d5/0x640 21:37:02 executing program 5: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x401) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) mount$nfs4(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000100)={[{'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {}, {'/dev/infiniband/rdma_cm\x00'}, {')}@)(-^$@\'@$'}], [{@pcr={'pcr', 0x3d, 0x3d}}]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3009.901951] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3009.907229] RIP: 0033:0x7fb7803d00f9 [ 3009.907688] FAULT_INJECTION: forcing a failure. [ 3009.907688] name failslab, interval 1, probability 0, space 0, times 0 [ 3009.910967] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3009.910980] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3009.910987] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3009.910994] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 21:37:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 8) [ 3009.911001] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3009.911008] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 [ 3009.968510] CPU: 1 PID: 27799 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3009.976547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3009.985922] Call Trace: [ 3009.988557] dump_stack+0x1b2/0x281 [ 3009.992302] should_fail.cold+0x10a/0x149 [ 3009.996460] should_failslab+0xd6/0x130 [ 3010.000437] __kmalloc_track_caller+0x2bc/0x400 [ 3010.005122] ? strndup_user+0x5b/0xf0 [ 3010.008931] memdup_user+0x22/0xa0 [ 3010.012466] strndup_user+0x5b/0xf0 [ 3010.016102] ? copy_mnt_ns+0xa30/0xa30 [ 3010.019982] SyS_mount+0x39/0x120 [ 3010.023427] ? copy_mnt_ns+0xa30/0xa30 [ 3010.027308] do_syscall_64+0x1d5/0x640 [ 3010.031194] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3010.036373] RIP: 0033:0x7f6e32d040f9 [ 3010.040081] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3010.047784] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3010.055047] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3010.062307] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.069572] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3010.076845] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 [ 3010.140838] FAULT_INJECTION: forcing a failure. [ 3010.140838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3010.152688] CPU: 1 PID: 27810 Comm: syz-executor.2 Not tainted 4.14.307-syzkaller #0 [ 3010.160563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3010.169908] Call Trace: [ 3010.172508] dump_stack+0x1b2/0x281 [ 3010.176133] should_fail.cold+0x10a/0x149 [ 3010.180290] __alloc_pages_nodemask+0x21e/0x2900 [ 3010.185048] ? __lock_acquire+0x5fc/0x3f20 [ 3010.189288] ? __lock_acquire+0x5fc/0x3f20 [ 3010.193610] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3010.198964] ? trace_hardirqs_on+0x10/0x10 [ 3010.203188] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3010.208023] ? depot_save_stack+0x10d/0x3f0 [ 3010.212337] ? __lock_acquire+0x5fc/0x3f20 [ 3010.216562] ? kstrdup_const+0x35/0x60 [ 3010.220446] ? lock_acquire+0x170/0x3f0 [ 3010.224412] cache_grow_begin+0x91/0x700 [ 3010.228462] ? fs_reclaim_release+0xd0/0x110 [ 3010.232860] ? check_preemption_disabled+0x35/0x240 [ 3010.237867] cache_alloc_refill+0x273/0x350 [ 3010.242180] kmem_cache_alloc+0x333/0x3c0 [ 3010.246322] getname_kernel+0x4e/0x340 [ 3010.250210] kern_path+0x1b/0x40 [ 3010.253578] lookup_bdev+0xc6/0x1c0 [ 3010.257211] ? bd_acquire+0x440/0x440 [ 3010.261012] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3010.266459] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3010.271470] blkdev_get_by_path+0x1b/0xa0 [ 3010.275610] mount_bdev+0x4c/0x360 [ 3010.279136] ? fuse_get_root_inode+0xc0/0xc0 [ 3010.283532] mount_fs+0x92/0x2a0 [ 3010.286891] vfs_kern_mount.part.0+0x5b/0x470 [ 3010.291378] do_mount+0xe65/0x2a30 [ 3010.294911] ? lock_acquire+0x170/0x3f0 [ 3010.298876] ? lock_downgrade+0x740/0x740 [ 3010.303295] ? copy_mount_string+0x40/0x40 [ 3010.307520] ? __might_fault+0x177/0x1b0 [ 3010.311575] ? _copy_from_user+0xb3/0x100 [ 3010.315716] ? copy_mount_options+0x1fa/0x2f0 [ 3010.320215] ? copy_mnt_ns+0xa30/0xa30 [ 3010.324095] SyS_mount+0xa8/0x120 [ 3010.327537] ? copy_mnt_ns+0xa30/0xa30 [ 3010.331415] do_syscall_64+0x1d5/0x640 [ 3010.335299] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3010.340475] RIP: 0033:0x7fb7803d00f9 [ 3010.344172] RSP: 002b:00007fb77e942168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3010.351891] RAX: ffffffffffffffda RBX: 00007fb7804eff80 RCX: 00007fb7803d00f9 [ 3010.359180] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3010.366559] RBP: 00007fb77e9421d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.373925] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3010.381187] R13: 00007fff0f439d5f R14: 00007fb77e942300 R15: 0000000000022000 21:37:03 executing program 4: ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000240)={{'\x00', 0x2}, {0x1f}, 0x40, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="efe51523ec70d36cc0abad6d94f662ce61a78582864699f6b6c7f100fd5cedb80d310b7ebb6800bdd99205c76e40b0016ba4bbf3c85df4c9c946ab41b2478a04e2fc3236d1f25114892473db4701f1e9e5d14fa9193c9f88b0b5b8cd1bc01924882e42dbf453271b2c59b64d66bd213b5641bc02e985713b081a1215908d4c", 0x7f, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x108}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffffffffffc}, 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200)={r0, r1+60000000}, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x8000, 0x200, 0xff0, 0x8, 0x3, 0x45fe, 0x6, 0x4}, &(0x7f00000002c0)={0x1, 0xd4, 0x53, 0x1f, 0x9, 0x7fffffffffffffff, 0x9, 0x1}, &(0x7f0000000480)={0x1, 0x70, 0x80000000, 0x0, 0x8e, 0xfffffffffffffff8, 0x1, 0xffffffff}, &(0x7f00000004c0), &(0x7f0000000540)={&(0x7f0000000500)={[0x7ff]}, 0x8}) 21:37:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 2) 21:37:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) mount$nfs4(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000100)={[{'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {}, {'/dev/infiniband/rdma_cm\x00'}, {')}@)(-^$@\'@$'}], [{@pcr={'pcr', 0x3d, 0x3d}}]}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:03 executing program 5: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x401) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:03 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 9) 21:37:03 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3010.595058] FAULT_INJECTION: forcing a failure. [ 3010.595058] name failslab, interval 1, probability 0, space 0, times 0 [ 3010.609575] CPU: 1 PID: 27822 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3010.617489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3010.627016] Call Trace: [ 3010.629620] dump_stack+0x1b2/0x281 [ 3010.633256] should_fail.cold+0x10a/0x149 [ 3010.637415] should_failslab+0xd6/0x130 [ 3010.641403] __kmalloc_track_caller+0x2bc/0x400 [ 3010.646343] ? strndup_user+0x5b/0xf0 [ 3010.650154] memdup_user+0x22/0xa0 [ 3010.653702] strndup_user+0x5b/0xf0 [ 3010.657339] ? copy_mnt_ns+0xa30/0xa30 [ 3010.661492] SyS_mount+0x68/0x120 [ 3010.664944] ? copy_mnt_ns+0xa30/0xa30 [ 3010.668841] do_syscall_64+0x1d5/0x640 [ 3010.672745] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3010.677937] RIP: 0033:0x7f6e32d040f9 [ 3010.681769] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:37:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) mount$nfs4(&(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000100)={[{'/dev/infiniband/rdma_cm\x00'}, {'/dev/infiniband/rdma_cm\x00'}, {}, {'/dev/infiniband/rdma_cm\x00'}, {')}@)(-^$@\'@$'}], [{@pcr={'pcr', 0x3d, 0x3d}}]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:37:03 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/158) 21:37:03 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2030005, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000000,dont_measure,smackfsdef=security.capability\x00,mask=MAY_READ,defcontext=unconfined_u,context=unconfined_u,obj_type=\\,obj_type={,\x00\x00\x00\x00\x00']) 21:37:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 3) 21:37:03 executing program 2: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/209, 0xd1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x5cbe42, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x224040, 0x134) acct(&(0x7f0000000240)='./file0\x00') [ 3010.689754] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3010.697023] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3010.704290] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.711572] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3010.718840] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:03 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async, rerun: 32) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (rerun: 32) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/158) [ 3010.832431] FAULT_INJECTION: forcing a failure. [ 3010.832431] name failslab, interval 1, probability 0, space 0, times 0 [ 3010.852219] CPU: 0 PID: 27844 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3010.860137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3010.869505] Call Trace: [ 3010.872118] dump_stack+0x1b2/0x281 [ 3010.875775] should_fail.cold+0x10a/0x149 [ 3010.879949] should_failslab+0xd6/0x130 [ 3010.883953] kmem_cache_alloc+0x28e/0x3c0 [ 3010.888125] getname_flags+0xc8/0x550 [ 3010.891954] user_path_at_empty+0x2a/0x50 [ 3010.896124] do_mount+0x118/0x2a30 [ 3010.899688] ? lock_acquire+0x170/0x3f0 [ 3010.903683] ? lock_downgrade+0x740/0x740 [ 3010.907850] ? copy_mount_string+0x40/0x40 [ 3010.912110] ? __might_fault+0x177/0x1b0 [ 3010.916189] ? _copy_from_user+0xb3/0x100 [ 3010.920362] ? copy_mount_options+0x1fa/0x2f0 [ 3010.924876] ? copy_mnt_ns+0xa30/0xa30 [ 3010.928784] SyS_mount+0xa8/0x120 [ 3010.932260] ? copy_mnt_ns+0xa30/0xa30 [ 3010.936166] do_syscall_64+0x1d5/0x640 [ 3010.940077] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3010.945278] RIP: 0033:0x7f6e32d040f9 [ 3010.948991] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3010.956712] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3010.963995] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3010.971283] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3010.978568] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3010.985835] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:04 executing program 4: ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000240)={{'\x00', 0x2}, {0x1f}, 0x40, 0x0, 0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="efe51523ec70d36cc0abad6d94f662ce61a78582864699f6b6c7f100fd5cedb80d310b7ebb6800bdd99205c76e40b0016ba4bbf3c85df4c9c946ab41b2478a04e2fc3236d1f25114892473db4701f1e9e5d14fa9193c9f88b0b5b8cd1bc01924882e42dbf453271b2c59b64d66bd213b5641bc02e985713b081a1215908d4c", 0x7f, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x108}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffffffffffc}, 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200)={r0, r1+60000000}, 0x0) (async) pselect6(0x40, &(0x7f00000001c0)={0x8000, 0x200, 0xff0, 0x8, 0x3, 0x45fe, 0x6, 0x4}, &(0x7f00000002c0)={0x1, 0xd4, 0x53, 0x1f, 0x9, 0x7fffffffffffffff, 0x9, 0x1}, &(0x7f0000000480)={0x1, 0x70, 0x80000000, 0x0, 0x8e, 0xfffffffffffffff8, 0x1, 0xffffffff}, &(0x7f00000004c0), &(0x7f0000000540)={&(0x7f0000000500)={[0x7ff]}, 0x8}) 21:37:04 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2030005, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000000,dont_measure,smackfsdef=security.capability\x00,mask=MAY_READ,defcontext=unconfined_u,context=unconfined_u,obj_type=\\,obj_type={,\x00\x00\x00\x00\x00']) 21:37:04 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x55, 0x0, 0x80, 0x49e7b610, 'syz1\x00', 0x2f2}, 0x3, 0x1, 0x2, 0x0, 0x1, 0x3, 'syz0\x00', &(0x7f0000000000)=['^-&(/$[{\x00\x00\x00\x01'], 0xc}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r2, r6}}, './file0\x00'}) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r7, 0x0, 0x0) 21:37:04 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/158) 21:37:04 executing program 2: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/209, 0xd1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x5cbe42, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x224040, 0x134) acct(&(0x7f0000000240)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/209, 0xd1) (async) open(&(0x7f0000000280)='./file0\x00', 0x5cbe42, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (async) openat(r0, &(0x7f0000000080)='./file0\x00', 0x224040, 0x134) (async) acct(&(0x7f0000000240)='./file0\x00') (async) 21:37:04 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 4) 21:37:04 executing program 2: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/209, 0xd1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x5cbe42, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (async) openat(r0, &(0x7f0000000080)='./file0\x00', 0x224040, 0x134) (async) acct(&(0x7f0000000240)='./file0\x00') 21:37:04 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2030005, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000000,dont_measure,smackfsdef=security.capability\x00,mask=MAY_READ,defcontext=unconfined_u,context=unconfined_u,obj_type=\\,obj_type={,\x00\x00\x00\x00\x00']) [ 3011.513103] FAULT_INJECTION: forcing a failure. [ 3011.513103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3011.524948] CPU: 0 PID: 27867 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3011.532842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3011.542211] Call Trace: [ 3011.544831] dump_stack+0x1b2/0x281 [ 3011.548489] should_fail.cold+0x10a/0x149 [ 3011.552657] __alloc_pages_nodemask+0x21e/0x2900 [ 3011.557525] ? is_bpf_text_address+0x91/0x150 21:37:04 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x301401, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x0, 0x1, @in={0x2, 0x0, @private=0xa010100}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r5, {0x7}}, './file0/file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) accept4(r1, &(0x7f0000000200)=@rc={0x1f, @fixed}, &(0x7f0000000300)=0x80, 0x80000) setxattr$security_capability(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000400)=0x6) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='user.incfs.id\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)=ANY=[@ANYBLOB="00fb5f0508af7cb86b83f2ffc97384a96b046e0b3d56f0c69cddd03a21142ad41b692905aeadc964b323a3fa21b8ad3e3da1ec45738aa6b6357e16ba61d385712cb341e6e03ebd16692f7e89896783c478f4c1af576d9a0d398bd8d3bea03d455ae3e8a340d02ca75a53a077696daaa6ce22e869c987c2466f3d06c7159acb08f46f181ee6c641143e480823a9214b7857eb45d68cf51e0336e54e3bbf7e286d6defc636c1be022406beb9d3833dfaa27678d8ef173821caa1"], 0x5f, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) [ 3011.562237] ? __lock_acquire+0x5fc/0x3f20 [ 3011.566494] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3011.571350] ? kernel_text_address+0xbd/0xf0 [ 3011.575774] ? lock_downgrade+0x740/0x740 [ 3011.579939] ? __kernel_text_address+0x9/0x30 [ 3011.584455] ? unwind_get_return_address+0x51/0x90 [ 3011.589406] ? depot_save_stack+0x10d/0x3f0 [ 3011.593754] cache_grow_begin+0x91/0x700 [ 3011.597830] ? fs_reclaim_release+0xd0/0x110 [ 3011.602258] ? check_preemption_disabled+0x35/0x240 [ 3011.607461] cache_alloc_refill+0x273/0x350 21:37:04 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x260701, 0x108) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x8000000000000001}}}, 0x28) [ 3011.611814] kmem_cache_alloc+0x333/0x3c0 [ 3011.616006] getname_flags+0xc8/0x550 [ 3011.619841] user_path_at_empty+0x2a/0x50 [ 3011.624011] do_mount+0x118/0x2a30 [ 3011.627598] ? lock_acquire+0x170/0x3f0 [ 3011.631597] ? lock_downgrade+0x740/0x740 [ 3011.635781] ? copy_mount_string+0x40/0x40 [ 3011.640031] ? __might_fault+0x177/0x1b0 [ 3011.644112] ? _copy_from_user+0xb3/0x100 [ 3011.648280] ? copy_mount_options+0x1fa/0x2f0 [ 3011.652789] ? copy_mnt_ns+0xa30/0xa30 [ 3011.656698] SyS_mount+0xa8/0x120 21:37:04 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x301401, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x0, 0x1, @in={0x2, 0x0, @private=0xa010100}}}, 0xa0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) (rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r5, {0x7}}, './file0/file0\x00'}) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) (async) accept4(r1, &(0x7f0000000200)=@rc={0x1f, @fixed}, &(0x7f0000000300)=0x80, 0x80000) (async) setxattr$security_capability(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x2) (async) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000400)=0x6) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='user.incfs.id\x00') (async) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)=ANY=[@ANYBLOB="00fb5f0508af7cb86b83f2ffc97384a96b046e0b3d56f0c69cddd03a21142ad41b692905aeadc964b323a3fa21b8ad3e3da1ec45738aa6b6357e16ba61d385712cb341e6e03ebd16692f7e89896783c478f4c1af576d9a0d398bd8d3bea03d455ae3e8a340d02ca75a53a077696daaa6ce22e869c987c2466f3d06c7159acb08f46f181ee6c641143e480823a9214b7857eb45d68cf51e0336e54e3bbf7e286d6defc636c1be022406beb9d3833dfaa27678d8ef173821caa1"], 0x5f, 0x1) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:04 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r0 = getuid() r1 = getuid() mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x40, &(0x7f0000000180)={'trans=xen,', {[{@cache_fscache}, {@aname={'aname', 0x3d, '-:*'}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@fscache}], [{@dont_hash}, {@uid_lt={'uid<', r0}}, {@euid_gt={'euid>', r1}}]}}) setxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=@v2={0x2000000, [{0x1, 0x2}, {0x40, 0x2}]}, 0x14, 0x1) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) [ 3011.660165] ? copy_mnt_ns+0xa30/0xa30 [ 3011.664067] do_syscall_64+0x1d5/0x640 [ 3011.667976] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3011.673180] RIP: 0033:0x7f6e32d040f9 [ 3011.676908] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3011.684634] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3011.691923] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3011.699208] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3011.706491] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3011.713771] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 [ 3011.758854] 9pnet: Could not find request transport: xen 21:37:05 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x260701, 0x108) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x8000000000000001}}}, 0x28) 21:37:05 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x55, 0x0, 0x80, 0x49e7b610, 'syz1\x00', 0x2f2}, 0x3, 0x1, 0x2, 0x0, 0x1, 0x3, 'syz0\x00', &(0x7f0000000000)=['^-&(/$[{\x00\x00\x00\x01'], 0xc}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() (async) r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) (async) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r5 = getuid() (async) r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r2, r6}}, './file0\x00'}) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r7, 0x0, 0x0) 21:37:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x8, 0x0, 0x2, 0x3, 0x0, 0x94b, 0x400}, &(0x7f0000000080)={0x9, 0x9, 0x7ffffffe, 0x3, 0x9e, 0x1f, 0x4, 0x9}, &(0x7f00000000c0)={0x400, 0x9, 0x7, 0x21, 0x1, 0x0, 0x2, 0x20005}, &(0x7f0000000100)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x1]}, 0x8}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x0, 0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xf3c}}, './file0\x00'}) 21:37:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 5) 21:37:05 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r0 = getuid() (async) r1 = getuid() mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x40, &(0x7f0000000180)={'trans=xen,', {[{@cache_fscache}, {@aname={'aname', 0x3d, '-:*'}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@fscache}], [{@dont_hash}, {@uid_lt={'uid<', r0}}, {@euid_gt={'euid>', r1}}]}}) setxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=@v2={0x2000000, [{0x1, 0x2}, {0x40, 0x2}]}, 0x14, 0x1) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:05 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x301401, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x0, 0x1, @in={0x2, 0x0, @private=0xa010100}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r5, {0x7}}, './file0/file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) accept4(r1, &(0x7f0000000200)=@rc={0x1f, @fixed}, &(0x7f0000000300)=0x80, 0x80000) setxattr$security_capability(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000400)=0x6) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='user.incfs.id\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)=ANY=[@ANYBLOB="00fb5f0508af7cb86b83f2ffc97384a96b046e0b3d56f0c69cddd03a21142ad41b692905aeadc964b323a3fa21b8ad3e3da1ec45738aa6b6357e16ba61d385712cb341e6e03ebd16692f7e89896783c478f4c1af576d9a0d398bd8d3bea03d455ae3e8a340d02ca75a53a077696daaa6ce22e869c987c2466f3d06c7159acb08f46f181ee6c641143e480823a9214b7857eb45d68cf51e0336e54e3bbf7e286d6defc636c1be022406beb9d3833dfaa27678d8ef173821caa1"], 0x5f, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x301401, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x0, 0x1, @in={0x2, 0x0, @private=0xa010100}}}, 0xa0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000020c0)) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r5, {0x7}}, './file0/file0\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) (async) accept4(r1, &(0x7f0000000200)=@rc={0x1f, @fixed}, &(0x7f0000000300)=0x80, 0x80000) (async) setxattr$security_capability(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x2) (async) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000400)=0x6) (async) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='user.incfs.id\x00') (async) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)=ANY=[@ANYBLOB="00fb5f0508af7cb86b83f2ffc97384a96b046e0b3d56f0c69cddd03a21142ad41b692905aeadc964b323a3fa21b8ad3e3da1ec45738aa6b6357e16ba61d385712cb341e6e03ebd16692f7e89896783c478f4c1af576d9a0d398bd8d3bea03d455ae3e8a340d02ca75a53a077696daaa6ce22e869c987c2466f3d06c7159acb08f46f181ee6c641143e480823a9214b7857eb45d68cf51e0336e54e3bbf7e286d6defc636c1be022406beb9d3833dfaa27678d8ef173821caa1"], 0x5f, 0x1) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:37:05 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x260701, 0x108) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0x8000000000000001}}}, 0x28) [ 3012.404915] FAULT_INJECTION: forcing a failure. [ 3012.404915] name failslab, interval 1, probability 0, space 0, times 0 [ 3012.430053] CPU: 0 PID: 27905 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3012.437981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3012.447339] Call Trace: [ 3012.449959] dump_stack+0x1b2/0x281 [ 3012.453619] should_fail.cold+0x10a/0x149 [ 3012.457788] should_failslab+0xd6/0x130 [ 3012.461789] kmem_cache_alloc+0x28e/0x3c0 [ 3012.465959] alloc_vfsmnt+0x23/0x7f0 [ 3012.469696] ? _raw_read_unlock+0x29/0x40 [ 3012.473866] vfs_kern_mount.part.0+0x27/0x470 [ 3012.478392] do_mount+0xe65/0x2a30 [ 3012.481977] ? lock_acquire+0x170/0x3f0 [ 3012.485974] ? lock_downgrade+0x740/0x740 [ 3012.490143] ? copy_mount_string+0x40/0x40 [ 3012.494391] ? __might_fault+0x177/0x1b0 [ 3012.498468] ? _copy_from_user+0xb3/0x100 [ 3012.502631] ? copy_mount_options+0x1fa/0x2f0 [ 3012.507138] ? copy_mnt_ns+0xa30/0xa30 [ 3012.511038] SyS_mount+0xa8/0x120 [ 3012.514508] ? copy_mnt_ns+0xa30/0xa30 [ 3012.518414] do_syscall_64+0x1d5/0x640 [ 3012.522321] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3012.527554] RIP: 0033:0x7f6e32d040f9 [ 3012.531271] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3012.539001] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3012.546282] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 21:37:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x8, 0x0, 0x2, 0x3, 0x0, 0x94b, 0x400}, &(0x7f0000000080)={0x9, 0x9, 0x7ffffffe, 0x3, 0x9e, 0x1f, 0x4, 0x9}, &(0x7f00000000c0)={0x400, 0x9, 0x7, 0x21, 0x1, 0x0, 0x2, 0x20005}, &(0x7f0000000100)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x1]}, 0x8}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x0, 0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xf3c}}, './file0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x8, 0x0, 0x2, 0x3, 0x0, 0x94b, 0x400}, &(0x7f0000000080)={0x9, 0x9, 0x7ffffffe, 0x3, 0x9e, 0x1f, 0x4, 0x9}, &(0x7f00000000c0)={0x400, 0x9, 0x7, 0x21, 0x1, 0x0, 0x2, 0x20005}, &(0x7f0000000100)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x1]}, 0x8}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x0, 0x8}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xf3c}}, './file0\x00'}) (async) 21:37:05 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xffffffffffffffda, 0x0, {{0x200000, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) recvmsg(r0, &(0x7f0000001200)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/168, 0xa8}, {&(0x7f0000002200)=""/4096, 0x1000}], 0x3}, 0x2000) 21:37:05 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xffffffffffffffda, 0x0, {{0x200000, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) (async) recvmsg(r0, &(0x7f0000001200)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/168, 0xa8}, {&(0x7f0000002200)=""/4096, 0x1000}], 0x3}, 0x2000) 21:37:05 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000140)={{0x55, 0x0, 0x80, 0x49e7b610, 'syz1\x00', 0x2f2}, 0x3, 0x1, 0x2, 0x0, 0x1, 0x3, 'syz0\x00', &(0x7f0000000000)=['^-&(/$[{\x00\x00\x00\x01'], 0xc}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r2 = getuid() (async) r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) (async) r4 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r5 = getuid() r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r2, r6}}, './file0\x00'}) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r7, 0x0, 0x0) 21:37:05 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r0 = getuid() (async) r1 = getuid() mount$9p_xen(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x40, &(0x7f0000000180)={'trans=xen,', {[{@cache_fscache}, {@aname={'aname', 0x3d, '-:*'}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@fscache}], [{@dont_hash}, {@uid_lt={'uid<', r0}}, {@euid_gt={'euid>', r1}}]}}) (async) setxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=@v2={0x2000000, [{0x1, 0x2}, {0x40, 0x2}]}, 0x14, 0x1) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:05 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) uselib(&(0x7f0000000040)='./file0\x00') [ 3012.553567] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3012.560939] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3012.568227] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:05 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 6) 21:37:05 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async, rerun: 64) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0xffffffffffffffda, 0x0, {{0x200000, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) (async, rerun: 64) recvmsg(r0, &(0x7f0000001200)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/168, 0xa8}, {&(0x7f0000002200)=""/4096, 0x1000}], 0x3}, 0x2000) 21:37:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async, rerun: 64) pselect6(0x40, &(0x7f0000000000)={0x80000000, 0x8, 0x0, 0x2, 0x3, 0x0, 0x94b, 0x400}, &(0x7f0000000080)={0x9, 0x9, 0x7ffffffe, 0x3, 0x9e, 0x1f, 0x4, 0x9}, &(0x7f00000000c0)={0x400, 0x9, 0x7, 0x21, 0x1, 0x0, 0x2, 0x20005}, &(0x7f0000000100)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x1]}, 0x8}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x0, 0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xf3c}}, './file0\x00'}) 21:37:05 executing program 2: open(&(0x7f0000000000)='./file1\x00', 0x2c0942, 0x1d9) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:05 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) uselib(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) uselib(&(0x7f0000000040)='./file0\x00') (async) [ 3012.740149] FAULT_INJECTION: forcing a failure. [ 3012.740149] name failslab, interval 1, probability 0, space 0, times 0 [ 3012.753653] CPU: 1 PID: 27955 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3012.761835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3012.771182] Call Trace: [ 3012.773766] dump_stack+0x1b2/0x281 [ 3012.777402] should_fail.cold+0x10a/0x149 [ 3012.781616] should_failslab+0xd6/0x130 [ 3012.785618] kmem_cache_alloc+0x28e/0x3c0 [ 3012.789778] getname_kernel+0x4e/0x340 [ 3012.793694] kern_path+0x1b/0x40 [ 3012.797075] lookup_bdev+0xc6/0x1c0 [ 3012.800707] ? bd_acquire+0x440/0x440 [ 3012.804512] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3012.809976] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3012.815004] blkdev_get_by_path+0x1b/0xa0 [ 3012.819156] mount_bdev+0x4c/0x360 [ 3012.822689] ? fuse_get_root_inode+0xc0/0xc0 [ 3012.827135] mount_fs+0x92/0x2a0 [ 3012.830508] vfs_kern_mount.part.0+0x5b/0x470 [ 3012.835002] do_mount+0xe65/0x2a30 [ 3012.838536] ? lock_acquire+0x170/0x3f0 [ 3012.842593] ? lock_downgrade+0x740/0x740 [ 3012.846756] ? copy_mount_string+0x40/0x40 [ 3012.851071] ? __might_fault+0x177/0x1b0 [ 3012.855123] ? _copy_from_user+0xb3/0x100 [ 3012.859363] ? copy_mount_options+0x1fa/0x2f0 [ 3012.863864] ? copy_mnt_ns+0xa30/0xa30 [ 3012.867746] SyS_mount+0xa8/0x120 [ 3012.871189] ? copy_mnt_ns+0xa30/0xa30 [ 3012.875072] do_syscall_64+0x1d5/0x640 [ 3012.878957] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3012.884289] RIP: 0033:0x7f6e32d040f9 21:37:05 executing program 4: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r1, r2, 0x4, r3}, 0x10) 21:37:05 executing program 2: open(&(0x7f0000000000)='./file1\x00', 0x2c0942, 0x1d9) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x800, 0x5, {"c44431771eaf2f07f0d43dfc3f014a01"}, 0x9, 0x8001, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3012.888007] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3012.895809] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3012.903082] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3012.910353] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3012.917645] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3012.924913] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 7) 21:37:06 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) uselib(&(0x7f0000000040)='./file0\x00') 21:37:06 executing program 2: open(&(0x7f0000000000)='./file1\x00', 0x2c0942, 0x1d9) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:06 executing program 4: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r1, r2, 0x4, r3}, 0x10) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x1) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r1, r2, 0x4, r3}, 0x10) (async) 21:37:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async, rerun: 64) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x800, 0x5, {"c44431771eaf2f07f0d43dfc3f014a01"}, 0x9, 0x8001, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) [ 3013.066984] FAULT_INJECTION: forcing a failure. [ 3013.066984] name failslab, interval 1, probability 0, space 0, times 0 [ 3013.088241] CPU: 0 PID: 27981 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3013.096252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3013.105636] Call Trace: [ 3013.108247] dump_stack+0x1b2/0x281 [ 3013.111901] should_fail.cold+0x10a/0x149 [ 3013.116088] should_failslab+0xd6/0x130 [ 3013.120087] kmem_cache_alloc+0x28e/0x3c0 [ 3013.124276] getname_kernel+0x4e/0x340 [ 3013.128188] kern_path+0x1b/0x40 [ 3013.131584] lookup_bdev+0xc6/0x1c0 [ 3013.135242] ? bd_acquire+0x440/0x440 [ 3013.139060] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3013.144531] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3013.149573] blkdev_get_by_path+0x1b/0xa0 [ 3013.153752] mount_bdev+0x4c/0x360 [ 3013.157329] ? fuse_get_root_inode+0xc0/0xc0 [ 3013.161763] mount_fs+0x92/0x2a0 [ 3013.165154] vfs_kern_mount.part.0+0x5b/0x470 [ 3013.169679] do_mount+0xe65/0x2a30 [ 3013.170107] kauditd_printk_skb: 26 callbacks suppressed [ 3013.170119] audit: type=1804 audit(1677793026.113:2587): pid=27990 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir744653831/syzkaller.ZZHzp0/13999/file0" dev="sda1" ino=14986 res=1 [ 3013.173237] ? lock_acquire+0x170/0x3f0 [ 3013.173252] ? lock_downgrade+0x740/0x740 [ 3013.173269] ? copy_mount_string+0x40/0x40 [ 3013.173284] ? __might_fault+0x177/0x1b0 [ 3013.173302] ? _copy_from_user+0xb3/0x100 [ 3013.222314] ? copy_mount_options+0x1fa/0x2f0 [ 3013.226845] ? copy_mnt_ns+0xa30/0xa30 [ 3013.230845] SyS_mount+0xa8/0x120 [ 3013.234319] ? copy_mnt_ns+0xa30/0xa30 [ 3013.238226] do_syscall_64+0x1d5/0x640 [ 3013.242146] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3013.247370] RIP: 0033:0x7f6e32d040f9 [ 3013.251128] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3013.258854] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20400, 0x8) mount$9p_virtio(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', &(0x7f0000002200), 0x1024044, &(0x7f0000002240)={'trans=virtio,', {[{@access_any}, {@access_user}, {@cachetag={'cachetag', 0x3d, 'security.capability\x00'}}, {@cache_loose}, {@loose}, {@aname={'aname', 0x3d, 'security.capability\x00'}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.capability\x00'}}]}}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x3212c1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) write$P9_RREADDIR(r2, &(0x7f0000000080)={0x2a, 0x29, 0x2, {0x0, [{{0x7b5785eb2a4f3283, 0x0, 0x4}, 0xfffffffffffffa8c, 0x81, 0x7, './file0'}]}}, 0x2a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000020c0)) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000002580)={'veth0_to_hsr\x00', &(0x7f0000002540)=@ethtool_stats={0x1d, 0x5, [0x10000, 0x4, 0x0, 0x7, 0x1c]}}) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) recvmsg$unix(r1, &(0x7f0000002500)={&(0x7f0000002340)=@abs, 0x6e, &(0x7f0000002400)=[{&(0x7f00000023c0)=""/59, 0x3b}], 0x1, &(0x7f0000002440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x40) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r10, 0xc018937b, &(0x7f00000025c0)={{0x1, 0x1, 0x18, r6, {r9, r5}}, './file0\x00'}) read$FUSE(r8, &(0x7f0000004700)={0x2020}, 0x2020) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) r12 = openat(r7, &(0x7f0000002640)='./file0\x00', 0x400081, 0x80) linkat(r11, &(0x7f0000002600)='./file0\x00', r12, &(0x7f0000002680)='./file0\x00', 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x400400, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, r4, {{0x0, 0x2}}}, 0x28) 21:37:06 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x2}]}, 0xc, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20400, 0x8) mount$9p_virtio(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', &(0x7f0000002200), 0x1024044, &(0x7f0000002240)={'trans=virtio,', {[{@access_any}, {@access_user}, {@cachetag={'cachetag', 0x3d, 'security.capability\x00'}}, {@cache_loose}, {@loose}, {@aname={'aname', 0x3d, 'security.capability\x00'}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.capability\x00'}}]}}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x3212c1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) (async) write$P9_RREADDIR(r2, &(0x7f0000000080)={0x2a, 0x29, 0x2, {0x0, [{{0x7b5785eb2a4f3283, 0x0, 0x4}, 0xfffffffffffffa8c, 0x81, 0x7, './file0'}]}}, 0x2a) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000020c0)) (async) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000002580)={'veth0_to_hsr\x00', &(0x7f0000002540)=@ethtool_stats={0x1d, 0x5, [0x10000, 0x4, 0x0, 0x7, 0x1c]}}) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) recvmsg$unix(r1, &(0x7f0000002500)={&(0x7f0000002340)=@abs, 0x6e, &(0x7f0000002400)=[{&(0x7f00000023c0)=""/59, 0x3b}], 0x1, &(0x7f0000002440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x40) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r10, 0xc018937b, &(0x7f00000025c0)={{0x1, 0x1, 0x18, r6, {r9, r5}}, './file0\x00'}) (async) read$FUSE(r8, &(0x7f0000004700)={0x2020}, 0x2020) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) (async) r12 = openat(r7, &(0x7f0000002640)='./file0\x00', 0x400081, 0x80) linkat(r11, &(0x7f0000002600)='./file0\x00', r12, &(0x7f0000002680)='./file0\x00', 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x400400, 0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, r4, {{0x0, 0x2}}}, 0x28) 21:37:06 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x2}]}, 0xc, 0x1) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x800, 0x5, {"c44431771eaf2f07f0d43dfc3f014a01"}, 0x9, 0x8001, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x800, 0x5, {"c44431771eaf2f07f0d43dfc3f014a01"}, 0x9, 0x8001, 0xffff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20400, 0x8) mount$9p_virtio(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', &(0x7f0000002200), 0x1024044, &(0x7f0000002240)={'trans=virtio,', {[{@access_any}, {@access_user}, {@cachetag={'cachetag', 0x3d, 'security.capability\x00'}}, {@cache_loose}, {@loose}, {@aname={'aname', 0x3d, 'security.capability\x00'}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.capability\x00'}}]}}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x3212c1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) (async) write$P9_RREADDIR(r2, &(0x7f0000000080)={0x2a, 0x29, 0x2, {0x0, [{{0x7b5785eb2a4f3283, 0x0, 0x4}, 0xfffffffffffffa8c, 0x81, 0x7, './file0'}]}}, 0x2a) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000020c0)) (async) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000002580)={'veth0_to_hsr\x00', &(0x7f0000002540)=@ethtool_stats={0x1d, 0x5, [0x10000, 0x4, 0x0, 0x7, 0x1c]}}) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f00000026c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) recvmsg$unix(r1, &(0x7f0000002500)={&(0x7f0000002340)=@abs, 0x6e, &(0x7f0000002400)=[{&(0x7f00000023c0)=""/59, 0x3b}], 0x1, &(0x7f0000002440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x40) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r10, 0xc018937b, &(0x7f00000025c0)={{0x1, 0x1, 0x18, r6, {r9, r5}}, './file0\x00'}) (async) read$FUSE(r8, &(0x7f0000004700)={0x2020}, 0x2020) (async) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) (async) r12 = openat(r7, &(0x7f0000002640)='./file0\x00', 0x400081, 0x80) linkat(r11, &(0x7f0000002600)='./file0\x00', r12, &(0x7f0000002680)='./file0\x00', 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x400400, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, r4, {{0x0, 0x2}}}, 0x28) 21:37:06 executing program 4: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100)={r1, r2, 0x4, r3}, 0x10) [ 3013.266144] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3013.273431] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3013.280721] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3013.288108] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 8) 21:37:06 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x2}]}, 0xc, 0x1) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r1 = getuid() r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x200800, &(0x7f0000000140)={[{@huge_always}, {@huge_within_size}], [{@obj_role}, {@fowner_gt={'fowner>', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x8000000000000001}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', r1}}]}) 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x32, 0x6, 0x0, {0x0, 0x5, 0x9, 0x0, '\\%({&@:({'}}, 0x32) [ 3013.426118] FAULT_INJECTION: forcing a failure. [ 3013.426118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3013.437957] CPU: 0 PID: 28037 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3013.443667] tmpfs: Bad mount option obj_role [ 3013.445847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3013.445851] Call Trace: [ 3013.445869] dump_stack+0x1b2/0x281 [ 3013.445893] should_fail.cold+0x10a/0x149 [ 3013.445911] __alloc_pages_nodemask+0x21e/0x2900 21:37:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="3ae50000000000002e2f66696c653000263f1072ea1e864898f5e56a5e26bdeaeb99777f1f93ebc8f644021025ef2fa098ca0b8a0eb6b13805b4a6b5bb461dadbdada034865eb1621b7264006aa84ba7a2f60d87581beb612ea67bc8411ce2f610ebef214c89b706303dc3b779d9113c3fdd3163cd9a7c3561c6cb1901087250a59a062100000003ea"]) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x32, 0x6, 0x0, {0x0, 0x5, 0x9, 0x0, '\\%({&@:({'}}, 0x32) [ 3013.474915] ? __lock_acquire+0x5fc/0x3f20 [ 3013.479170] ? __lock_acquire+0x5fc/0x3f20 [ 3013.483422] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3013.488805] ? trace_hardirqs_on+0x10/0x10 [ 3013.493080] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3013.497956] ? depot_save_stack+0x10d/0x3f0 [ 3013.502308] ? __lock_acquire+0x5fc/0x3f20 [ 3013.506568] ? kstrdup_const+0x35/0x60 [ 3013.510478] ? lock_acquire+0x170/0x3f0 [ 3013.514475] cache_grow_begin+0x91/0x700 [ 3013.518549] ? fs_reclaim_release+0xd0/0x110 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x32, 0x6, 0x0, {0x0, 0x5, 0x9, 0x0, '\\%({&@:({'}}, 0x32) [ 3013.523074] ? check_preemption_disabled+0x35/0x240 [ 3013.528137] cache_alloc_refill+0x273/0x350 [ 3013.532588] kmem_cache_alloc+0x333/0x3c0 [ 3013.536848] getname_kernel+0x4e/0x340 [ 3013.540764] kern_path+0x1b/0x40 [ 3013.544155] lookup_bdev+0xc6/0x1c0 [ 3013.547794] ? bd_acquire+0x440/0x440 [ 3013.551601] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 3013.557074] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3013.562113] blkdev_get_by_path+0x1b/0xa0 [ 3013.566276] mount_bdev+0x4c/0x360 [ 3013.570004] ? fuse_get_root_inode+0xc0/0xc0 21:37:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="3ae50000000000002e2f66696c653000263f1072ea1e864898f5e56a5e26bdeaeb99777f1f93ebc8f644021025ef2fa098ca0b8a0eb6b13805b4a6b5bb461dadbdada034865eb1621b7264006aa84ba7a2f60d87581beb612ea67bc8411ce2f610ebef214c89b706303dc3b779d9113c3fdd3163cd9a7c3561c6cb1901087250a59a062100000003ea"]) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0xffffffffffffffff) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (rerun: 64) prctl$PR_SET_KEEPCAPS(0x8, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) [ 3013.574473] mount_fs+0x92/0x2a0 [ 3013.577860] vfs_kern_mount.part.0+0x5b/0x470 [ 3013.582379] do_mount+0xe65/0x2a30 [ 3013.585937] ? lock_acquire+0x170/0x3f0 [ 3013.589935] ? lock_downgrade+0x740/0x740 [ 3013.594105] ? copy_mount_string+0x40/0x40 [ 3013.598359] ? __might_fault+0x177/0x1b0 [ 3013.602438] ? _copy_from_user+0xb3/0x100 [ 3013.606611] ? copy_mount_options+0x1fa/0x2f0 [ 3013.611122] ? copy_mnt_ns+0xa30/0xa30 [ 3013.615027] SyS_mount+0xa8/0x120 [ 3013.618489] ? copy_mnt_ns+0xa30/0xa30 [ 3013.622382] do_syscall_64+0x1d5/0x640 21:37:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="3ae50000000000002e2f66696c653000263f1072ea1e864898f5e56a5e26bdeaeb99777f1f93ebc8f644021025ef2fa098ca0b8a0eb6b13805b4a6b5bb461dadbdada034865eb1621b7264006aa84ba7a2f60d87581beb612ea67bc8411ce2f610ebef214c89b706303dc3b779d9113c3fdd3163cd9a7c3561c6cb1901087250a59a062100000003ea"]) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="3ae50000000000002e2f66696c653000263f1072ea1e864898f5e56a5e26bdeaeb99777f1f93ebc8f644021025ef2fa098ca0b8a0eb6b13805b4a6b5bb461dadbdada034865eb1621b7264006aa84ba7a2f60d87581beb612ea67bc8411ce2f610ebef214c89b706303dc3b779d9113c3fdd3163cd9a7c3561c6cb1901087250a59a062100000003ea"]) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) prctl$PR_SET_KEEPCAPS(0x8, 0xffffffffffffffff) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) prctl$PR_SET_KEEPCAPS(0x8, 0x1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000020c0)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) (async) [ 3013.626282] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3013.631506] RIP: 0033:0x7f6e32d040f9 [ 3013.635229] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3013.643031] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3013.650311] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3013.657595] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3013.664897] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 21:37:06 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x0, @ib={0x1b, 0x1, 0x7, {"2f8363902c82b935ee4369c27fad2f4f"}, 0x26e6, 0x9, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x2, {0x20000000, 0xffffffff, "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", 0x3, 0x20, 0x6, 0xdd, 0x4, 0x80, 0x3f}, r2}}, 0x128) 21:37:06 executing program 1: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x9, 0x9, 0x4, 0x2, 0x1, 0x9, 0x6}) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) 21:37:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r1 = getuid() (async) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) (async) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x200800, &(0x7f0000000140)={[{@huge_always}, {@huge_within_size}], [{@obj_role}, {@fowner_gt={'fowner>', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x8000000000000001}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', r1}}]}) 21:37:06 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 9) [ 3013.672172] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4c2180, 0x0) linkat(r1, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x7fff}}}, 0x28) 21:37:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 21:37:06 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x0, @ib={0x1b, 0x1, 0x7, {"2f8363902c82b935ee4369c27fad2f4f"}, 0x26e6, 0x9, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x2, {0x20000000, 0xffffffff, "cd2894201ebdb6b2a7401e2f613591100a7c9c81a61f0bab287f5aa881aa3d2653dbc569fffbbeac7845b09259f836d6cd1c50e6900ab62e564265606eef8ae6fe8fad766aa3384768ccb4e68b6d25cc7b179208f8a68c504ba99ab708c5c813f274a4ec6f43eb3793f13f00c727c88f3b88bad5c09390355552fdf05c3da24eddf62250d99a72462b7c435c48ddaeafd94419e1cd81cd3ca7ce7e510157885594eb6c62088f52cf8355a9c3188e0c4e0e4d9083cd6b765f9fd39b54636136c087b1b58eb96744187335871e5138a2ffb2149660c2fa74bbca87149dc95f9dbf0ca054f710ca2ef709aa0e72022ca63c867c6babaa89c949c2b118016c555d54", 0x3, 0x20, 0x6, 0xdd, 0x4, 0x80, 0x3f}, r2}}, 0x128) 21:37:06 executing program 1: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x9, 0x9, 0x4, 0x2, 0x1, 0x9, 0x6}) (async, rerun: 32) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (rerun: 32) [ 3013.769585] FAULT_INJECTION: forcing a failure. [ 3013.769585] name failslab, interval 1, probability 0, space 0, times 0 [ 3013.802910] CPU: 0 PID: 28080 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3013.810832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3013.820198] Call Trace: [ 3013.822802] dump_stack+0x1b2/0x281 [ 3013.826469] should_fail.cold+0x10a/0x149 [ 3013.830647] should_failslab+0xd6/0x130 [ 3013.834656] kmem_cache_alloc_trace+0x29a/0x3d0 [ 3013.839351] ? set_bdev_super+0x110/0x110 [ 3013.843517] sget_userns+0x102/0xc10 [ 3013.847250] ? set_bdev_super+0x110/0x110 [ 3013.851444] ? ns_test_super+0x50/0x50 [ 3013.855356] ? set_bdev_super+0x110/0x110 [ 3013.859527] ? ns_test_super+0x50/0x50 [ 3013.863436] sget+0xd1/0x110 [ 3013.866476] mount_bdev+0xcd/0x360 [ 3013.870026] ? fuse_get_root_inode+0xc0/0xc0 [ 3013.874455] mount_fs+0x92/0x2a0 [ 3013.877841] vfs_kern_mount.part.0+0x5b/0x470 [ 3013.882356] do_mount+0xe65/0x2a30 [ 3013.885926] ? lock_acquire+0x170/0x3f0 [ 3013.889916] ? lock_downgrade+0x740/0x740 [ 3013.894090] ? copy_mount_string+0x40/0x40 [ 3013.894193] tmpfs: Bad mount option obj_role [ 3013.898334] ? __might_fault+0x177/0x1b0 [ 3013.898361] ? _copy_from_user+0xb3/0x100 [ 3013.898376] ? copy_mount_options+0x1fa/0x2f0 [ 3013.898390] ? copy_mnt_ns+0xa30/0xa30 [ 3013.919395] SyS_mount+0xa8/0x120 [ 3013.922869] ? copy_mnt_ns+0xa30/0xa30 [ 3013.926791] do_syscall_64+0x1d5/0x640 [ 3013.930715] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3013.936093] RIP: 0033:0x7f6e32d040f9 [ 3013.939819] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3013.947552] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3013.954843] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3013.962138] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 21:37:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r1 = getuid() (async) r2 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2]) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x200800, &(0x7f0000000140)={[{@huge_always}, {@huge_within_size}], [{@obj_role}, {@fowner_gt={'fowner>', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x8000000000000001}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', r1}}]}) 21:37:06 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4c2180, 0x0) linkat(r1, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x7fff}}}, 0x28) 21:37:06 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 21:37:06 executing program 1: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x9, 0x9, 0x4, 0x2, 0x1, 0x9, 0x6}) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) 21:37:06 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x1, 0x0) 21:37:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (rerun: 64) 21:37:07 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="81000000000000000e2f66696c653000f0512fad21940cecc8"]) linkat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 10) 21:37:07 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4c2180, 0x0) linkat(r1, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x7fff}}}, 0x28) [ 3013.969424] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 3013.976710] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:07 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x1, 0x0) 21:37:07 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x1c, 0x0, @ib={0x1b, 0x1, 0x7, {"2f8363902c82b935ee4369c27fad2f4f"}, 0x26e6, 0x9, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x2, {0x20000000, 0xffffffff, "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", 0x3, 0x20, 0x6, 0xdd, 0x4, 0x80, 0x3f}, r2}}, 0x128) [ 3014.080784] FAULT_INJECTION: forcing a failure. [ 3014.080784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3014.092638] CPU: 1 PID: 28124 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3014.100545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3014.109896] Call Trace: [ 3014.112484] dump_stack+0x1b2/0x281 [ 3014.116111] should_fail.cold+0x10a/0x149 [ 3014.120257] __alloc_pages_nodemask+0x21e/0x2900 [ 3014.125026] ? __lock_acquire+0x5fc/0x3f20 [ 3014.129284] ? __lock_acquire+0x5fc/0x3f20 [ 3014.133532] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3014.138369] ? blkdev_get+0x484/0x890 [ 3014.142163] ? blkdev_get+0x484/0x890 [ 3014.145967] ? trace_hardirqs_on+0x10/0x10 [ 3014.150218] cache_grow_begin+0x91/0x700 [ 3014.154278] ? fs_reclaim_release+0xd0/0x110 [ 3014.158680] ? check_preemption_disabled+0x35/0x240 [ 3014.163714] cache_alloc_refill+0x273/0x350 [ 3014.168043] kmem_cache_alloc_trace+0x340/0x3d0 [ 3014.172825] ? set_bdev_super+0x110/0x110 [ 3014.176974] sget_userns+0x102/0xc10 [ 3014.180700] ? set_bdev_super+0x110/0x110 [ 3014.184852] ? ns_test_super+0x50/0x50 [ 3014.188749] ? set_bdev_super+0x110/0x110 [ 3014.192905] ? ns_test_super+0x50/0x50 [ 3014.196802] sget+0xd1/0x110 [ 3014.199823] mount_bdev+0xcd/0x360 [ 3014.203444] ? fuse_get_root_inode+0xc0/0xc0 [ 3014.207886] mount_fs+0x92/0x2a0 [ 3014.211296] vfs_kern_mount.part.0+0x5b/0x470 [ 3014.215879] do_mount+0xe65/0x2a30 [ 3014.219413] ? lock_acquire+0x170/0x3f0 [ 3014.223379] ? lock_downgrade+0x740/0x740 [ 3014.227544] ? copy_mount_string+0x40/0x40 [ 3014.231781] ? __might_fault+0x177/0x1b0 [ 3014.235850] ? _copy_from_user+0xb3/0x100 [ 3014.239990] ? copy_mount_options+0x1fa/0x2f0 [ 3014.244483] ? copy_mnt_ns+0xa30/0xa30 [ 3014.248381] SyS_mount+0xa8/0x120 [ 3014.251838] ? copy_mnt_ns+0xa30/0xa30 [ 3014.255727] do_syscall_64+0x1d5/0x640 [ 3014.259629] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3014.264814] RIP: 0033:0x7f6e32d040f9 [ 3014.268524] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:37:07 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="81000000000000000e2f66696c653000f0512fad21940cecc8"]) linkat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="81000000000000000e2f66696c653000f0512fad21940cecc8"]) (async) linkat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) 21:37:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x0, "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", 0x6, 0x0, 0xff, 0x9, 0xda, 0xc9, 0x20}, r1}}, 0x128) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xffff, 0x401, "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", 0xfc, 0x2, 0x8, 0x7f, 0x0, 0xff, 0x6, 0x1}}}, 0x128) 21:37:07 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0b43, 0x2b0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3046020, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@hash}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 21:37:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 11) [ 3014.276253] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3014.283532] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3014.290795] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.298085] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 3014.305384] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:07 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000), 0x1, 0x0) 21:37:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000040)=0x6e, 0x800) accept4$unix(r2, &(0x7f0000000280), &(0x7f0000000180)=0x6e, 0x800) r3 = accept4(r1, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) accept(r3, &(0x7f0000000100)=@llc, &(0x7f00000001c0)=0x80) 21:37:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x0, "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", 0x6, 0x0, 0xff, 0x9, 0xda, 0xc9, 0x20}, r1}}, 0x128) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xffff, 0x401, "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", 0xfc, 0x2, 0x8, 0x7f, 0x0, 0xff, 0x6, 0x1}}}, 0x128) 21:37:07 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0f42, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="81000000000000000e2f66696c653000f0512fad21940cecc8"]) linkat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:07 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0b43, 0x2b0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3046020, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@hash}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 21:37:07 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000040)=0x6e, 0x800) accept4$unix(r2, &(0x7f0000000280), &(0x7f0000000180)=0x6e, 0x800) r3 = accept4(r1, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000020c0)) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) (async) accept(r3, &(0x7f0000000100)=@llc, &(0x7f00000001c0)=0x80) [ 3014.448911] FAULT_INJECTION: forcing a failure. [ 3014.448911] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.490888] CPU: 0 PID: 28150 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3014.498820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3014.508187] Call Trace: [ 3014.510803] dump_stack+0x1b2/0x281 [ 3014.514539] should_fail.cold+0x10a/0x149 [ 3014.518719] should_failslab+0xd6/0x130 [ 3014.522810] __kmalloc+0x2c1/0x400 [ 3014.526372] ? __list_lru_init+0x67/0x710 [ 3014.530548] __list_lru_init+0x67/0x710 [ 3014.534551] sget_userns+0x504/0xc10 [ 3014.538290] ? set_bdev_super+0x110/0x110 [ 3014.542466] ? ns_test_super+0x50/0x50 [ 3014.546384] ? set_bdev_super+0x110/0x110 [ 3014.550553] ? ns_test_super+0x50/0x50 [ 3014.554455] sget+0xd1/0x110 [ 3014.557495] mount_bdev+0xcd/0x360 [ 3014.561057] ? fuse_get_root_inode+0xc0/0xc0 [ 3014.565491] mount_fs+0x92/0x2a0 [ 3014.568884] vfs_kern_mount.part.0+0x5b/0x470 [ 3014.573398] do_mount+0xe65/0x2a30 [ 3014.576960] ? lock_acquire+0x170/0x3f0 [ 3014.581019] ? lock_downgrade+0x740/0x740 [ 3014.585188] ? copy_mount_string+0x40/0x40 [ 3014.589455] ? __might_fault+0x177/0x1b0 [ 3014.593539] ? _copy_from_user+0xb3/0x100 [ 3014.597708] ? copy_mount_options+0x1fa/0x2f0 [ 3014.602229] ? copy_mnt_ns+0xa30/0xa30 [ 3014.606260] SyS_mount+0xa8/0x120 [ 3014.609731] ? copy_mnt_ns+0xa30/0xa30 [ 3014.613641] do_syscall_64+0x1d5/0x640 [ 3014.617553] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3014.622753] RIP: 0033:0x7f6e32d040f9 [ 3014.626472] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3014.634193] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 21:37:07 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (async) 21:37:07 executing program 1: r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x14}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000081, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c61707072616973652cc475626a5f747b70653d736563757269497e6b0542c4416ce9c404487479286361706162696c697479002c6673757569643d313336353636353e2d306261652d313436322d6b396d612d64313533666163782c646f6e"]) 21:37:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000040)=0x6e, 0x800) accept4$unix(r2, &(0x7f0000000280), &(0x7f0000000180)=0x6e, 0x800) r3 = accept4(r1, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000020c0)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) accept(r3, &(0x7f0000000100)=@llc, &(0x7f00000001c0)=0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) accept4$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000040)=0x6e, 0x800) (async) accept4$unix(r2, &(0x7f0000000280), &(0x7f0000000180)=0x6e, 0x800) (async) accept4(r1, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001c80)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000020c0)) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x9}}, './file0\x00'}) (async) accept(r3, &(0x7f0000000100)=@llc, &(0x7f00000001c0)=0x80) (async) 21:37:07 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 21:37:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (fail_nth: 12) 21:37:07 executing program 1: r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x14}, 0x10) (async) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) (async) r2 = getuid() (async) r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000081, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c61707072616973652cc475626a5f747b70653d736563757269497e6b0542c4416ce9c404487479286361706162696c697479002c6673757569643d313336353636353e2d306261652d313436322d6b396d612d64313533666163782c646f6e"]) 21:37:07 executing program 4: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000340)="2e48e2888772b556c5b5a2846b7a79eaecf8be2986cc30eb8cd8894276521986d4e015f1ce1e87398414f03afa00437c5fdc07b9344a730675fc45ba073dfb4d56bedf82c98a285c5f9dad00f697dd1dfa7f0c9611dc1d5373a61f1fce1a29a0652db3f658f36fcf58a59e9cc56a587c5cbe36ba838d55b9fe27c3184b942b2f915dee03618696ebc72a6f6cdb79951d21bb3a1fe8a16cde0376df09c4ad35cc16c7f7e9861ddda5be50060c99fb0729c52687bedfe2921ad973bf7f5973ff08dceb449db5bbf8c559ea0287f50afa06482bb4c4d131d7b0005b", 0xda}, {&(0x7f00000001c0)="6775d366773dd1f3558b196e34f67ae344723ce2b251647e70d376bac629256a928bb6c1085cc2cd286501c1dda9f8dd497336f32b97c91a7b5b35a27b", 0x3d}], 0x2, 0x0, 0x0, 0x48010}}], 0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) 21:37:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x0, "30e1646ce0818d05e3014fbd7744e66cb6eff61f23d074d3e463107b08b136c5c1ae0a8847ef225a5ca8d9c7fb74a311b349151d35e78a371715e886bc993fb1139b9a77e8272810c85e75df9f82ab006aff9efdc2a5b0788f3ae7b885557d624100a63dcdaab23a58767eba79a5a8d8c53d83cdb66a79f48720ac055b8d42323e1e8f7f5b71ca4f910a057cd795763372b0d7370ede2de9ef583c212d9499fce51052b070a76626734606b399455d8dd172c0e27fbe688bd9456cc9dbdab87ec6f0d4a4dbc228bcbd5fc4d84c0c212e7cd21b9d09ddeb4098260c42025e8134200fc8dd80adaf68368116c7a7d036b42ddce65a9f5cad33ca7c0ca402965e90", 0x6, 0x0, 0xff, 0x9, 0xda, 0xc9, 0x20}, r1}}, 0x128) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xffff, 0x401, "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", 0xfc, 0x2, 0x8, 0x7f, 0x0, 0xff, 0x6, 0x1}}}, 0x128) 21:37:07 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0xffffffffffffffda}, 0x10) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="060000002e2f00"/19]) r2 = geteuid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000018, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'Q\xc5'}}, {@obj_role}, {@appraise_type}]}}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), 0x20, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x35, 0x2c, 0x34, 0x34]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x35, 0x2d, 0x95d53735ccc207fc, 0x25]}}, {@huge_always}, {@huge_advise}, {@size={'size', 0x3d, [0x39, 0x67, 0x31, 0x36]}}, {@mode={'mode', 0x3d, 0xe4}}, {@nr_blocks={'nr_blocks', 0x3d, [0x74]}}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [{@context={'context', 0x3d, 'root'}}, {@flag='async'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 21:37:07 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0xb0b43, 0x2b0) (async) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) (async) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3046020, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@hash}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) [ 3014.641473] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3014.648761] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.656043] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 3014.663326] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 21:37:07 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0xffffffffffffffda}, 0x10) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="060000002e2f00"/19]) (async) r2 = geteuid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2000018, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'Q\xc5'}}, {@obj_role}, {@appraise_type}]}}) (async, rerun: 32) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) (rerun: 32) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), 0x20, &(0x7f0000000400)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @val={0x3a, [0x35, 0x2c, 0x34, 0x34]}}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x35, 0x2d, 0x95d53735ccc207fc, 0x25]}}, {@huge_always}, {@huge_advise}, {@size={'size', 0x3d, [0x39, 0x67, 0x31, 0x36]}}, {@mode={'mode', 0x3d, 0xe4}}, {@nr_blocks={'nr_blocks', 0x3d, [0x74]}}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}], [{@context={'context', 0x3d, 'root'}}, {@flag='async'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 21:37:07 executing program 4: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000340)="2e48e2888772b556c5b5a2846b7a79eaecf8be2986cc30eb8cd8894276521986d4e015f1ce1e87398414f03afa00437c5fdc07b9344a730675fc45ba073dfb4d56bedf82c98a285c5f9dad00f697dd1dfa7f0c9611dc1d5373a61f1fce1a29a0652db3f658f36fcf58a59e9cc56a587c5cbe36ba838d55b9fe27c3184b942b2f915dee03618696ebc72a6f6cdb79951d21bb3a1fe8a16cde0376df09c4ad35cc16c7f7e9861ddda5be50060c99fb0729c52687bedfe2921ad973bf7f5973ff08dceb449db5bbf8c559ea0287f50afa06482bb4c4d131d7b0005b", 0xda}, {&(0x7f00000001c0)="6775d366773dd1f3558b196e34f67ae344723ce2b251647e70d376bac629256a928bb6c1085cc2cd286501c1dda9f8dd497336f32b97c91a7b5b35a27b", 0x3d}], 0x2, 0x0, 0x0, 0x48010}}], 0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000340)="2e48e2888772b556c5b5a2846b7a79eaecf8be2986cc30eb8cd8894276521986d4e015f1ce1e87398414f03afa00437c5fdc07b9344a730675fc45ba073dfb4d56bedf82c98a285c5f9dad00f697dd1dfa7f0c9611dc1d5373a61f1fce1a29a0652db3f658f36fcf58a59e9cc56a587c5cbe36ba838d55b9fe27c3184b942b2f915dee03618696ebc72a6f6cdb79951d21bb3a1fe8a16cde0376df09c4ad35cc16c7f7e9861ddda5be50060c99fb0729c52687bedfe2921ad973bf7f5973ff08dceb449db5bbf8c559ea0287f50afa06482bb4c4d131d7b0005b", 0xda}, {&(0x7f00000001c0)="6775d366773dd1f3558b196e34f67ae344723ce2b251647e70d376bac629256a928bb6c1085cc2cd286501c1dda9f8dd497336f32b97c91a7b5b35a27b", 0x3d}], 0x2, 0x0, 0x0, 0x48010}}], 0x1, 0x1) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) (async) 21:37:07 executing program 1: r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) (async) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x14}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0xd40, 0x0) r2 = getuid() r3 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3]) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2000081, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c61707072616973652cc475626a5f747b70653d736563757269497e6b0542c4416ce9c404487479286361706162696c697479002c6673757569643d313336353636353e2d306261652d313436322d6b396d612d64313533666163782c646f6e"]) [ 3014.775078] FAULT_INJECTION: forcing a failure. [ 3014.775078] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.840319] CPU: 0 PID: 28201 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3014.848241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3014.857608] Call Trace: [ 3014.860222] dump_stack+0x1b2/0x281 [ 3014.863873] should_fail.cold+0x10a/0x149 [ 3014.868043] should_failslab+0xd6/0x130 [ 3014.872033] __kmalloc+0x2c1/0x400 [ 3014.875582] ? register_shrinker+0x1ab/0x220 [ 3014.880002] register_shrinker+0x1ab/0x220 [ 3014.884247] sget_userns+0x9aa/0xc10 21:37:07 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0xb0f42, 0x0) setxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x0, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28}, 0x28) 21:37:07 executing program 4: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000340)="2e48e2888772b556c5b5a2846b7a79eaecf8be2986cc30eb8cd8894276521986d4e015f1ce1e87398414f03afa00437c5fdc07b9344a730675fc45ba073dfb4d56bedf82c98a285c5f9dad00f697dd1dfa7f0c9611dc1d5373a61f1fce1a29a0652db3f658f36fcf58a59e9cc56a587c5cbe36ba838d55b9fe27c3184b942b2f915dee03618696ebc72a6f6cdb79951d21bb3a1fe8a16cde0376df09c4ad35cc16c7f7e9861ddda5be50060c99fb0729c52687bedfe2921ad973bf7f5973ff08dceb449db5bbf8c559ea0287f50afa06482bb4c4d131d7b0005b", 0xda}, {&(0x7f00000001c0)="6775d366773dd1f3558b196e34f67ae344723ce2b251647e70d376bac629256a928bb6c1085cc2cd286501c1dda9f8dd497336f32b97c91a7b5b35a27b", 0x3d}], 0x2, 0x0, 0x0, 0x48010}}], 0x1, 0x1) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) (async) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200), 0x0) [ 3014.887986] ? set_bdev_super+0x110/0x110 [ 3014.892156] ? ns_test_super+0x50/0x50 [ 3014.896066] ? set_bdev_super+0x110/0x110 [ 3014.900228] ? ns_test_super+0x50/0x50 [ 3014.904164] sget+0xd1/0x110 [ 3014.907224] mount_bdev+0xcd/0x360 [ 3014.910779] ? fuse_get_root_inode+0xc0/0xc0 [ 3014.915212] mount_fs+0x92/0x2a0 [ 3014.918596] vfs_kern_mount.part.0+0x5b/0x470 [ 3014.923112] do_mount+0xe65/0x2a30 [ 3014.926675] ? lock_acquire+0x170/0x3f0 [ 3014.930669] ? lock_downgrade+0x740/0x740 [ 3014.934840] ? copy_mount_string+0x40/0x40 21:37:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r2}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r2, 0xe79f}}, 0x10) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, r5}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r5, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0x12eb, 0x96, {"d8618d714ad58a5aa70eecf333825742"}, 0xbc6, 0x10001, 0x82}, @in6={0xa, 0x4e21, 0xff8, @local, 0xa869}}}, 0x118) [ 3014.939101] ? __might_fault+0x177/0x1b0 [ 3014.943192] ? _copy_from_user+0xb3/0x100 [ 3014.947367] ? copy_mount_options+0x1fa/0x2f0 [ 3014.951880] ? copy_mnt_ns+0xa30/0xa30 [ 3014.955786] SyS_mount+0xa8/0x120 [ 3014.959260] ? copy_mnt_ns+0xa30/0xa30 [ 3014.963166] do_syscall_64+0x1d5/0x640 [ 3014.967083] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3014.972288] RIP: 0033:0x7f6e32d040f9 [ 3014.976009] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3014.983738] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3014.991021] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3014.998308] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3015.005591] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 3015.012868] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 [ 3015.046560] ------------[ cut here ]------------ [ 3015.051369] WARNING: CPU: 0 PID: 28201 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 3015.059281] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 3015.059281] [ 3015.067340] CPU: 0 PID: 28201 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 [ 3015.075216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 3015.084566] Call Trace: [ 3015.087151] dump_stack+0x1b2/0x281 [ 3015.090772] panic+0x21d/0x451 [ 3015.093961] ? add_taint.cold+0x16/0x16 [ 3015.097928] ? log_store.cold+0x16/0x16 [ 3015.101898] ? kill_block_super+0xbe/0xe0 [ 3015.106081] check_panic_on_warn.cold+0x19/0x35 [ 3015.110744] __warn+0xdf/0x1e0 [ 3015.113932] ? ist_end_non_atomic+0x10/0x10 [ 3015.118269] ? kill_block_super+0xbe/0xe0 [ 3015.122419] report_bug+0x208/0x250 [ 3015.126040] do_error_trap+0x195/0x2d0 [ 3015.129937] ? math_error+0x2d0/0x2d0 [ 3015.133728] ? retint_kernel+0x2d/0x2d [ 3015.137783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3015.142817] invalid_op+0x1b/0x40 [ 3015.146265] RIP: 0010:kill_block_super+0xbe/0xe0 [ 3015.151008] RSP: 0018:ffff8880b1a2fbc8 EFLAGS: 00010246 [ 3015.156360] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90005be6000 [ 3015.163627] RDX: 0000000000040000 RSI: ffffffff81877b4e RDI: ffff8880b1d70b70 [ 3015.170893] RBP: ffff888086604500 R08: ffffffff8b9d70f8 R09: 0000000000000001 [ 3015.178152] R10: 0000000000000000 R11: ffff888088966600 R12: ffff8880b1d706c0 [ 3015.185413] R13: ffffffff891eb370 R14: ffffffff88f46340 R15: dffffc0000000000 [ 3015.192690] ? kill_block_super+0xbe/0xe0 [ 3015.196849] ? kill_block_super+0xbe/0xe0 [ 3015.201004] deactivate_locked_super+0x6c/0xd0 [ 3015.205576] sget_userns+0x9c4/0xc10 [ 3015.209278] ? set_bdev_super+0x110/0x110 [ 3015.213419] ? ns_test_super+0x50/0x50 [ 3015.217296] ? set_bdev_super+0x110/0x110 [ 3015.221432] ? ns_test_super+0x50/0x50 [ 3015.225308] sget+0xd1/0x110 [ 3015.228319] mount_bdev+0xcd/0x360 [ 3015.231848] ? fuse_get_root_inode+0xc0/0xc0 [ 3015.236337] mount_fs+0x92/0x2a0 [ 3015.239699] vfs_kern_mount.part.0+0x5b/0x470 [ 3015.244186] do_mount+0xe65/0x2a30 [ 3015.247720] ? lock_acquire+0x170/0x3f0 [ 3015.251691] ? lock_downgrade+0x740/0x740 [ 3015.255833] ? copy_mount_string+0x40/0x40 [ 3015.260064] ? __might_fault+0x177/0x1b0 [ 3015.264142] ? _copy_from_user+0xb3/0x100 [ 3015.268285] ? copy_mount_options+0x1fa/0x2f0 [ 3015.272772] ? copy_mnt_ns+0xa30/0xa30 [ 3015.276651] SyS_mount+0xa8/0x120 [ 3015.280098] ? copy_mnt_ns+0xa30/0xa30 [ 3015.283978] do_syscall_64+0x1d5/0x640 [ 3015.287879] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 3015.293058] RIP: 0033:0x7f6e32d040f9 [ 3015.296757] RSP: 002b:00007f6e31276168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3015.304457] RAX: ffffffffffffffda RBX: 00007f6e32e23f80 RCX: 00007f6e32d040f9 [ 3015.311802] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 3015.319078] RBP: 00007f6e312761d0 R08: 0000000000000000 R09: 0000000000000000 [ 3015.326355] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000002 [ 3015.333632] R13: 00007ffc708118af R14: 00007f6e31276300 R15: 0000000000022000 [ 3015.341264] Kernel Offset: disabled [ 3015.344965] Rebooting in 86400 seconds..